Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 11 out of 15 pages
Viewing questions 151-165 out of questions
Questions # 151:

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Also he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router nobody can access to the ftp and the permitted hosts cannot access to the Internet. According to the next configuration what is happening in the network?

Question # 151

Options:

A.

The ACL 110 needs to be changed to port 80


B.

The ACL for FTP must be before the ACL 110


C.

The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router


D.

The ACL 104 needs to be first because is UDP


Expert Solution
Questions # 152:

Which of the following will perform an Xmas scan using NMAP?

Options:

A.

nmap -sA 192.168.1.254


B.

nmap -sP 192.168.1.254


C.

nmap -sX 192.168.1.254


D.

nmap -sV 192.168.1.254


Expert Solution
Questions # 153:

You’ve just gained root access to a Centos 6 server after days of trying. What tool should you use to maintain access?

Options:

A.

Disable Key Services


B.

Create User Account


C.

Download and Install Netcat


D.

Disable IPTables


Expert Solution
Questions # 154:

In order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?

Options:

A.

Network layer headers and the session layer port numbers


B.

Presentation layer headers and the session layer port numbers


C.

Application layer port numbers and the transport layer headers


D.

Transport layer port numbers and application layer headers


Expert Solution
Questions # 155:

Which of the following is a wireless network detector that is commonly found on Linux?

Options:

A.

Kismet


B.

Abel


C.

Netstumbler


D.

Nessus


Expert Solution
Questions # 156:

You have initiated an active operating system fingerprinting attempt with nmap against a target system:

Question # 156

What operating system is the target host running based on the open ports shown above?

Options:

A.

Windows XP


B.

Windows 98 SE


C.

Windows NT4 Server


D.

Windows 2000 Server


Expert Solution
Questions # 157:

It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?

Options:

A.

Containment


B.

Eradication


C.

Recovery


D.

Discovery


Expert Solution
Questions # 158:

What attack is used to crack passwords by using a precomputed table of hashed passwords?

Options:

A.

Brute Force Attack


B.

Hybrid Attack


C.

Rainbow Table Attack


D.

Dictionary Attack


Expert Solution
Questions # 159:

A server has been infected by a certain type of Trojan. The hacker intended to utilize it to send and host junk mails. What type of Trojan did the hacker use?

Options:

A.

Turtle Trojans


B.

Ransomware Trojans


C.

Botnet Trojan


D.

Banking Trojans


Expert Solution
Questions # 160:

What would you type on the Windows command line in order to launch the Computer Management Console provided that you are logged in as an admin?

Options:

A.

c:\compmgmt.msc


B.

c:\gpedit


C.

c:\ncpa.cpl


D.

c:\services.msc


Expert Solution
Questions # 161:

What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?

What kind of Web application vulnerability likely exists in their software?

Options:

A.

Host-Based Intrusion Detection System


B.

Security through obscurity


C.

Defense in depth


D.

Network-Based Intrusion Detection System


Expert Solution
Questions # 162:

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?

Options:

A.

Identifying operating systems, services, protocols and devices


B.

Modifying and replaying captured network traffic


C.

Collecting unencrypted information about usernames and passwords


D.

Capturing a network traffic for further analysis


Expert Solution
Questions # 163:

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

Options:

A.

Data items and vulnerability scanning


B.

Interviewing employees and network engineers


C.

Reviewing the firewalls configuration


D.

Source code review


Expert Solution
Questions # 164:

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address.

What is the first thing that Nedved needs to do before contacting the incident response team?

Options:

A.

Leave it as it Is and contact the incident response te3m right away


B.

Block the connection to the suspicious IP Address from the firewall


C.

Disconnect the email server from the network


D.

Migrate the connection to the backup email server


Expert Solution
Questions # 165:

A hacker named Jack is trying to compromise a bank’s computer system. He needs to know the operating system of that computer to launch further attacks.

What process would help him?

Options:

A.

Banner Grabbing


B.

IDLE/IPID Scanning


C.

SSDP Scanning


D.

UDP Scanning


Expert Solution
Viewing page 11 out of 15 pages
Viewing questions 151-165 out of questions