Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 13 out of 15 pages
Viewing questions 181-195 out of questions
Questions # 181:

On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service. What is the name of the process by which you can determine those critical business?

Options:

A.

Risk Mitigation


B.

Emergency Plan Response (EPR)


C.

Disaster Recovery Planning (DRP)


D.

Business Impact Analysis (BIA)


Expert Solution
Questions # 182:

The collection of potentially actionable, overt, and publicly available information is known as

Options:

A.

Open-source intelligence


B.

Human intelligence


C.

Social intelligence


D.

Real intelligence


Expert Solution
Questions # 183:

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

Options:

A.

Port security


B.

A Layer 2 Attack Prevention Protocol (LAPP)


C.

Dynamic ARP inspection (DAI)


D.

Spanning tree


Expert Solution
Questions # 184:

What is the least important information when you analyze a public IP address in a security alert?

Options:

A.

ARP


B.

Whois


C.

DNS


D.

Geolocation


Expert Solution
Questions # 185:

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Options:

A.

Bluesmacking


B.

Bluesniffing


C.

Bluesnarfing


D.

Bluejacking


Expert Solution
Questions # 186:

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

Options:

A.

SQL injection attack


B.

Cross-Site Scripting (XSS)


C.

LDAP Injection attack


D.

Cross-Site Request Forgery (CSRF)


Expert Solution
Questions # 187:

A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wire shark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

Options:

A.

tcp.port != 21


B.

tcp.port = 23


C.

tcp.port ==21


D.

tcp.port ==21 || tcp.port ==22


Expert Solution
Questions # 188:

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Options:

A.

Internet Key Exchange (IKE)


B.

Oakley


C.

IPsec Policy Agent


D.

IPsec driver


Expert Solution
Questions # 189:

What does the -oX flag do in an Nmap scan?

Options:

A.

Perform an express scan


B.

Output the results in truncated format to the screen


C.

Perform an Xmas scan


D.

Output the results in XML format to a file


Expert Solution
Questions # 190:

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below:

source IP: 192.168.21.100

source port: 80

destination IP: 192.168.10.23

destination port: 63221

What is the most proper answer.

Options:

A.

This is most probably true negative.


B.

This is most probably true positive which triggered on secure communication between client and server.


C.

This is most probably false-positive, because an alert triggered on reversed traffic.


D.

This is most probably false-positive because IDS is monitoring one direction traffic.


Expert Solution
Questions # 191:

An attacker scans a host with the below command. Which three flags are set? (Choose three.)

#nmap –sX host.domain.com

Options:

A.

This is ACK scan. ACK flag is set


B.

This is Xmas scan. SYN and ACK flags are set


C.

This is Xmas scan. URG, PUSH and FIN are set


D.

This is SYN scan. SYN flag is set


Expert Solution
Questions # 192:

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

Options:

A.

Regularly test security systems and processes.


B.

Encrypt transmission of cardholder data across open, public networks.


C.

Assign a unique ID to each person with computer access.


D.

Use and regularly update anti-virus software on all systems commonly affected by malware.


Expert Solution
Questions # 193:

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

Options:

A.

USER, NICK


B.

LOGIN, NICK


C.

USER, PASS


D.

LOGIN, USER


Expert Solution
Questions # 194:

This kind of password cracking method uses word lists in combination with numbers and special characters:

Options:

A.

Hybrid


B.

Linear


C.

Symmetric


D.

Brute Force


Expert Solution
Questions # 195:

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

Question # 195

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Options:

A.

Switch then acts as hub by broadcasting packets to all machines on the network


B.

The CAM overflow table will cause the switch to crash causing Denial of Service


C.

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF


D.

Every packet is dropped and the switch sends out SNMP alerts to the IDS port


Expert Solution
Viewing page 13 out of 15 pages
Viewing questions 181-195 out of questions