Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 136-150 out of questions
Questions # 136:

What are two things that are possible when scanning UDP ports? (Choose two.)

Options:

A.

A reset will be returned


B.

An ICMP message will be returned


C.

The four-way handshake will not be completed


D.

An RFC 1294 message will be returned


E.

Nothing


Expert Solution
Questions # 137:

What is the best Nmap command to use when you want to list all devices in the same network quickly after you successfully identified a server whose IP address is 10.10.0.5?

Options:

A.

nmap -T4 -F 10.10.0.0/24


B.

nmap -T4 -q 10.10.0.0/24


C.

nmap -T4 -O 10.10.0.0/24


D.

nmap -T4 -r 10.10.1.0/24


Expert Solution
Questions # 138:

Which of the following tools would MOST LIKELY be used to perform security audit on various of forms of network systems?

Options:

A.

Intrusion Detection System


B.

Vulnerability scanner


C.

Port scanner


D.

Protocol analyzer


Expert Solution
Questions # 139:

Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?

Options:

A.

Gaining access


B.

Escalating privileges


C.

Network mapping


D.

Footprinting


Expert Solution
Questions # 140:

Which of the following command line switch would you use for OS detection in Nmap?

Options:

A.

-D


B.

-O


C.

-P


D.

–X


Expert Solution
Questions # 141:

Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited due to vulnerabilities of varying web applications?

Options:

A.

Use cryptographic storage to store all PII


B.

Use full disk encryption on all hard drives to protect PII


C.

Use encrypted communications protocols to transmit PII


D.

Use a security token to log into all Web applications that use PII


Expert Solution
Questions # 142:

Which of the following is a restriction being enforced in “white box testing?”

Options:

A.

Only the internal operation of a system is known to the tester


B.

The internal operation of a system is completely known to the tester


C.

The internal operation of a system is only partly accessible to the tester


D.

Only the external operation of a system is accessible to the tester


Expert Solution
Questions # 143:

The following are types of Bluetooth attack EXCEPT_____?

Options:

A.

Bluejacking


B.

Bluesmaking


C.

Bluesnarfing


D.

Bluedriving


Expert Solution
Questions # 144:

Which specific element of security testing is being assured by using hash?

Options:

A.

Authentication


B.

Integrity


C.

Confidentiality


D.

Availability


Expert Solution
Questions # 145:

A big company, who wanted to test their security infrastructure, wants to hire elite pen testers like you. During the interview, they asked you to show sample reports from previous penetration tests. What should you do?

Options:

A.

Share reports, after NDA is signed


B.

Share full reports, not redacted


C.

Decline but, provide references


D.

Share full reports with redactions


Expert Solution
Questions # 146:

One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the shortlisted pen testers that they may hire. During the interview with the CIO, he emphasized that he wants to totally eliminate all risks. What is one of the first things you should do when hired?

Options:

A.

Interview all employees in the company to rule out possible insider threats.


B.

Establish attribution to suspected attackers.


C.

Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.


D.

Start the Wireshark application to start sniffing network traffic.


Expert Solution
Questions # 147:

Which of the following is a vulnerability in GNU’s bash shell (discovered in September of 2014) that gives attackers access to run remote commands on a vulnerable system?

Options:

A.

Shellshock


B.

Rootshell


C.

Rootshock


D.

Shellbash


Expert Solution
Questions # 148:

Name two software tools used for OS guessing? (Choose two.)

Options:

A.

Nmap


B.

Snadboy


C.

Queso


D.

UserInfo


E.

NetBus


Expert Solution
Questions # 149:

Which of the following is a form of penetration testing that relies heavily on human interaction and often involves tricking people into breaking normal security procedures?

Options:

A.

Social Engineering


B.

Piggybacking


C.

Tailgating


D.

Eavesdropping


Expert Solution
Questions # 150:

Which of the following tools is used by pen testers and analysts specifically to analyze links between data using link analysis and graphs?

Options:

A.

Metasploit


B.

Wireshark


C.

Maltego


D.

Cain & Abel


Expert Solution
Viewing page 10 out of 15 pages
Viewing questions 136-150 out of questions