Q1. What is Certified Professional Ethical Hacker Certification?
A Certified Professional Ethical Hacker (CPEH)™ is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not
Q2. How many questions are there in the examination?
The Exam contains 100 Multiple Choice Questions
Q3. How much do I have to score in order to pass in the exam?
You must correctly answer 70 questions to pass the exam.
Q4. What is the mode of the examination?
Exams are online and proctored based, using a webcam and a reliable internet connection exam can be taken anywhere and anytime.
Q5. What is the duration of the exam?
The total duration of the exam is 2 hours (120 Minutes)
Q6. Exam is open book?
No external sources of information may be accessed during the exam. Just your identification proof will be needed
Q7. Is there any limit for retaking the exam?
If a Candidate does not pass the exam in the second (2nd) attempt, the candidate must wait for a period of at least fourteen (14) calendar days from the date of their attempt to retake the exam for third (3rd) time or any subsequent time.
The exam can be taken any number of times.
Q8. What is the certification validity?
The Certified Professional Ethical Hacker (CPEH) Certificate is valid for life.
Q9. Are there any pre-requisite of CPEH?
The Certified Professional Ethical Hacker (CPEH) Certification has no pre-requisites
Q10. What topics are covered in CPEH?
- Enumeration & System Hacking
- Trojans and Backdoors & Sniffers
- DOS & Social Engineering
- Session Hijacking & Web Servers
- Web Applications & Passwords
- SQL injection & Wireless
- Hacking Wireless Networks
- Viruses & Novell
- Linux & Evasion
- Buffer Overflows & Cryptology