Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions
Questions # 1:

How does the Address Resolution Protocol (ARP) work?

Options:

A.

It sends a request packet to all the network elements, asking for the MAC address from a specific IP.


B.

It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.


C.

It sends a reply packet for a specific IP, asking for the MAC address.


D.

It sends a request packet to all the network elements, asking for the domain name from a specific IP.


Expert Solution
Questions # 2:

It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.

Which of the following regulations best matches the description?

Options:

A.

HIPAA


B.

ISO/IEC 27002


C.

COBIT


D.

FISMA


Expert Solution
Questions # 3:

This asymmetry cipher is based on factoring the product of two large prime numbers.

What cipher is described above?

Options:

A.

RSA


B.

SHA


C.

RC5


D.

MD5


Expert Solution
Questions # 4:

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.

What is the best approach?

Options:

A.

Install Cryptcat and encrypt outgoing packets from this server.


B.

Install and use Telnet to encrypt all outgoing traffic from this server.


C.

Use Alternate Data Streams to hide the outgoing packets from this server.


D.

Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.


Expert Solution
Questions # 5:

It is a vulnerability in GNU's bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).

Which of the following vulnerabilities is being described?

Options:

A.

Shellshock


B.

Rootshock


C.

Rootshell


D.

Shellbash


Expert Solution
Questions # 6:

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content.

Which sort of trojan infects this server?

Options:

A.

Botnet Trojan


B.

Turtle Trojans


C.

Banking Trojans


D.

Ransomware Trojans


Expert Solution
Questions # 7:

Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.

What should you do?

Options:

A.

Immediately stop work and contact the proper legal authorities.


B.

Copy the data to removable media and keep it in case you need it.


C.

Confront the client in a respectful manner and ask her about the data.


D.

Ignore the data and continue the assessment until completed as agreed.


Expert Solution
Questions # 8:

Nation-state threat actors often discover vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of vulnerability.

What is this style of attack called?

Options:

A.

zero-day


B.

zero-hour


C.

zero-sum


D.

no-day


Expert Solution
Questions # 9:

This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.

Which of the following organizations is being described?

Options:

A.

Payment Card Industry (PCI)


B.

Center for Disease Control (CDC)


C.

Institute of Electrical and Electronics Engineers (IEEE)


D.

International Security Industry Organization (ISIO)


Expert Solution
Questions # 10:

It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.

Which of the following terms best matches the definition?

Options:

A.

Threat


B.

Attack


C.

Vulnerability


D.

Risk


Expert Solution
Questions # 11:

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.

Question # 11

What seems to be wrong?

Options:

A.

OS Scan requires root privileges.


B.

The nmap syntax is wrong.


C.

This is a common behavior for a corrupted nmap application.


D.

The outgoing TCP/IP fingerprinting is blocked by the host firewall.


Expert Solution
Questions # 12:

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)

Options:

A.

An Intrusion Detection System


B.

A firewall IPTable


C.

A Router IPTable


D.

FTP Server rule


Expert Solution
Questions # 13:

Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close.

What just happened?

Options:

A.

Piggybacking


B.

Masqurading


C.

Phishing


D.

Whaling


Expert Solution
Questions # 14:

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

What is this type of DNS configuration commonly called?

Options:

A.

Split DNS


B.

DNSSEC


C.

DynDNS


D.

DNS Scheme


Expert Solution
Questions # 15:

You are using NMAP to resolve domain names into IP addresses for a ping sweep later.

Which of the following commands looks for IP addresses?

Options:

A.

>host -t a hackeddomain.com


B.

>host -t soa hackeddomain.com


C.

>host -t ns hackeddomain.com


D.

>host -t AXFR hackeddomain.com


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions