GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Nov 01,2025.
- Exam Code: CPEH-001
 - Exam Name: Certified Professional Ethical Hacker (CPEH)
 - Certification Provider: GAQM
 - Latest update: Nov 01,2025
 
You are looking for SQL injection vulnerability by sending a special character to web applications.
Which of the following is the most useful for quick validation?
- A . Double quotation
 - B . Backslash
 - C . Semicolon
 - D . Single quotation
 
A virus that attempts to install itself inside the file it is infecting is called?
- A . Tunneling virus
 - B . Cavity virus
 - C . Polymorphic virus
 - D . Stealth virus
 
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
- A . Bob can be right since DMZ does not make sense when combined with stateless firewalls
 - B . Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
 - C . Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
 - D . Bob is partially right. DMZ does not make sense when a stateless firewall is available
 
Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide the real traffic.
What type of method is Sam using to evade IDS?
- A . Denial-of-Service
 - B . False Positive Generation
 - C . Insertion Attack
 - D . Obfuscating