Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 41-60 out of questions
Questions # 41:

Which of the following are advantages of adopting a Single Sign On (SSO) system? (Choose two.)

Options:

A.

A reduction in password fatigue for users because they do not need to know multiple passwords when accessing multiple applications


B.

A reduction in network and application monitoring since all recording will be completed at the SSO system


C.

A reduction in system administration overhead since any user login problems can be resolved at the SSO system


D.

A reduction in overall risk to the system since network and application attacks can only happen at the SSO point


Expert Solution
Questions # 42:

A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.)

Options:

A.

ARP spoofing


B.

MAC duplication


C.

MAC flooding


D.

SYN flood


E.

Reverse smurf attack


F.

ARP broadcasting


Expert Solution
Questions # 43:

Which of the following are variants of mandatory access control mechanisms? (Choose two.)

Options:

A.

Two factor authentication


B.

Acceptable use policy


C.

Username / password


D.

User education program


E.

Sign in register


Expert Solution
Questions # 44:

Information gathered from social networking websites such as Facebook, Twitter and LinkedIn can be used to launch which of the following types of attacks? (Choose two.)

Options:

A.

Smurf attack


B.

Social engineering attack


C.

SQL injection attack


D.

Phishing attack


E.

Fraggle attack


F.

Distributed denial of service attack


Expert Solution
Questions # 45:

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

Options:

A.

Public key


B.

Private key


C.

Modulus length


D.

Email server certificate


Expert Solution
Questions # 46:

What are the three types of authentication?

Options:

A.

Something you: know, remember, prove


B.

Something you: have, know, are


C.

Something you: show, prove, are


D.

Something you: show, have, prove


Expert Solution
Questions # 47:

A tester has been using the msadc.pl attack script to execute arbitrary commands on a Windows NT4 web server. While it is effective, the tester finds it tedious to perform extended functions.

On further research, the tester come across a perl script that runs the following msadc functions:system("perl msadc.pl -h $host -C \"echo open $your >testfile\"");

Question # 47

Which exploit is indicated by this script?

Options:

A.

A buffer overflow exploit


B.

A chained exploit


C.

A SQL injection exploit


D.

A denial of service exploit


Expert Solution
Questions # 48:

A newly discovered flaw in a software application would be considered which kind of security vulnerability?

Options:

A.

Input validation flaw


B.

HTTP header injection vulnerability


C.

0-day vulnerability


D.

Time-to-check to time-to-use flaw


Expert Solution
Questions # 49:

What is the best defense against privilege escalation vulnerability?

Options:

A.

Patch systems regularly and upgrade interactive login privileges at the system administrator level.


B.

Run administrator and applications on least privileges and use a content registry for tracking.


C.

Run services with least privileged accounts and implement multi-factor authentication and authorization.


D.

Review user roles and administrator privileges for maximum utilization of automation services.


Expert Solution
Questions # 50:

A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?

Options:

A.

-sO


B.

-sP


C.

-sS


D.

-sU


Expert Solution
Questions # 51:

What information should an IT system analysis provide to the risk assessor?

Options:

A.

Management buy-in


B.

Threat statement


C.

Security architecture


D.

Impact analysis


Expert Solution
Questions # 52:

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:

A.

Paros Proxy


B.

BBProxy


C.

BBCrack


D.

Blooover


Expert Solution
Questions # 53:

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

Options:

A.

white box


B.

grey box


C.

red box


D.

black box


Expert Solution
Questions # 54:

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Options:

A.

Cavity virus


B.

Polymorphic virus


C.

Tunneling virus


D.

Stealth virus


Expert Solution
Questions # 55:

Which of the following is used to indicate a single-line comment in structured query language (SQL)?

Options:

A.

--


B.

||


C.

%%


D.

''


Expert Solution
Questions # 56:

Which security strategy requires using several, varying methods to protect IT systems against attacks?

Options:

A.

Defense in depth


B.

Three-way handshake


C.

Covert channels


D.

Exponential backoff algorithm


Expert Solution
Questions # 57:

Which of the following business challenges could be solved by using a vulnerability scanner?

Options:

A.

Auditors want to discover if all systems are following a standard naming convention.


B.

A web server was compromised and management needs to know if any further systems were compromised.


C.

There is an emergency need to remove administrator access from multiple machines for an employee that quit.


D.

There is a monthly requirement to test corporate compliance with host application usage and security policies.


Expert Solution
Questions # 58:

A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database.

In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?

Options:

A.

Semicolon


B.

Single quote


C.

Exclamation mark


D.

Double quote


Expert Solution
Questions # 59:

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

Options:

A.

Physical


B.

Procedural


C.

Technical


D.

Compliance


Expert Solution
Questions # 60:

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?

Options:

A.

Sarbanes-Oxley Act (SOX)


B.

Gramm-Leach-Bliley Act (GLBA)


C.

Fair and Accurate Credit Transactions Act (FACTA)


D.

Federal Information Security Management Act (FISMA)


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 41-60 out of questions