Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 12 out of 15 pages
Viewing questions 166-180 out of questions
Questions # 166:

Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn’t log out from emails or other social media accounts, and etc.

After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons.

Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

Options:

A.

Warning to those who write password on a post it note and put it on his/her desk


B.

Developing a strict information security policy


C.

Information security awareness training


D.

Conducting a one to one discussion with the other employees about the importance of information security


Expert Solution
Questions # 167:

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

Options:

A.

Keyed Hashing


B.

Key Stretching


C.

Salting


D.

Double Hashing


Expert Solution
Questions # 168:

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

Options:

A.

Nmap


B.

Cain & Abel


C.

Nessus


D.

Snort


Expert Solution
Questions # 169:

What is the minimum number of network connections in a multi homed firewall?

Options:

A.

3


B.

5


C.

4


D.

2


Expert Solution
Questions # 170:

Your business has decided to add credit card numbers to the data it backs up to tape. Which of the

following represents the best practice your business should observe?

Options:

A.

Hire a security consultant to provide direction.


B.

Do not back up cither the credit card numbers or then hashes.


C.

Back up the hashes of the credit card numbers not the actual credit card numbers.


D.

Encrypt backup tapes that are sent off-site.


Expert Solution
Questions # 171:

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

Options:

A.

All three servers need to be placed internally


B.

A web server facing the Internet, an application server on the internal network, a database server on the internal network


C.

A web server and the database server facing the Internet, an application server on the internal network


D.

All three servers need to face the Internet so that they can communicate between themselves


Expert Solution
Questions # 172:

In Wireshark, the packet bytes panes show the data of the current packet in which format?

Options:

A.

Decimal


B.

ASCII only


C.

Binary


D.

Hexadecimal


Expert Solution
Questions # 173:

Code injection is a form of attack in which a malicious user:

Options:

A.

Inserts text into a data field that gets interpreted as code


B.

Gets the server to execute arbitrary code using a buffer overflow


C.

Inserts additional code into the JavaScript running in the browser


D.

Gains access to the codebase on the server and inserts new code


Expert Solution
Questions # 174:

A virus that attempts to install itself inside the file it is infecting is called?

Options:

A.

Tunneling virus


B.

Cavity virus


C.

Polymorphic virus


D.

Stealth virus


Expert Solution
Questions # 175:

Cross-site request forgery involves:

Options:

A.

A request sent by a malicious user from a browser to a server


B.

Modification of a request by a proxy between client and server


C.

A browser making a request to a server without the user’s knowledge


D.

A server making a request to another server without the user’s knowledge


Expert Solution
Questions # 176:

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

Options:

A.

Bootrom Exploit


B.

iBoot Exploit


C.

Sandbox Exploit


D.

Userland Exploit


Expert Solution
Questions # 177:

Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?

Options:

A.

Chosen-Cipher text Attack


B.

Ciphertext-only Attack


C.

Timing Attack


D.

Rubber Hose Attack


Expert Solution
Questions # 178:

From the following table, identify the wrong answer in terms of Range (ft).

Question # 178

Options:

A.

802.11b


B.

802.11g


C.

802.16(WiMax)


D.

802.11a


Expert Solution
Questions # 179:

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library

are required to allow the NIC to work in promiscuous mode?

Options:

A.

Libpcap


B.

Awinpcap


C.

Winprom


D.

Winpcap


Expert Solution
Questions # 180:

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

A camera captures people walking and identifies the individuals using Steve’s approach.

After that, people must approximate their RFID badges. Both the identifications are required to open the door.

In this case, we can say:

Options:

A.

Although the approach has two phases, it actually implements just one authentication factor


B.

The solution implements the two authentication factors: physical object and physical characteristic


C.

The solution will have a high level of false positives


D.

Biological motion cannot be used to identify people


Expert Solution
Viewing page 12 out of 15 pages
Viewing questions 166-180 out of questions