Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 15 out of 15 pages
Viewing questions 211-225 out of questions
Questions # 211:

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Options:

A.

symmetric algorithms


B.

asymmetric algorithms


C.

hashing algorithms


D.

integrity algorithms


Expert Solution
Questions # 212:

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches.

If these switches' ARP cache is successfully flooded, what will be the result?

Options:

A.

The switches will drop into hub mode if the ARP cache is successfully flooded.


B.

If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.


C.

Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.


D.

The switches will route all traffic to the broadcast address created collisions.


Expert Solution
Questions # 213:

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.

What is this document called?

Options:

A.

Information Audit Policy (IAP)


B.

Information Security Policy (ISP)


C.

Penetration Testing Policy (PTP)


D.

Company Compliance Policy (CCP)


Expert Solution
Questions # 214:

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Options:

A.

Birthday


B.

Brute force


C.

Man-in-the-middle


D.

Smurf


Expert Solution
Questions # 215:

What is a NULL scan?

Options:

A.

A scan in which all flags are turned off


B.

A scan in which certain flags are off


C.

A scan in which all flags are on


D.

A scan in which the packet size is set to zero


E.

A scan with an illegal packet size


Expert Solution
Questions # 216:

Which command can be used to show the current TCP/IP connections?

Options:

A.

Netsh


B.

Netstat


C.

Net use connection


D.

Net use


Expert Solution
Questions # 217:

Which of the following are well known password-cracking programs?

Options:

A.

L0phtcrack


B.

NetCat


C.

Jack the Ripper


D.

Netbus


E.

John the Ripper


Expert Solution
Questions # 218:

Study the following log extract and identify the attack.

Question # 218

Options:

A.

Hexcode Attack


B.

Cross Site Scripting


C.

Multiple Domain Traversal Attack


D.

Unicode Directory Traversal Attack


Expert Solution
Questions # 219:

Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?

Options:

A.

Take over the session


B.

Reverse sequence prediction


C.

Guess the sequence numbers


D.

Take one of the parties offline


Expert Solution
Questions # 220:

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.

Your peer, Peter Smith who works at the same department disagrees with you.

He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.

What is Peter Smith talking about?

Options:

A.

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain


B.

"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks


C.

"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks


D.

Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway


Expert Solution
Viewing page 15 out of 15 pages
Viewing questions 211-225 out of questions