Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions
Questions # 16:

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.

What nmap script will help you with this task?

Options:

A.

http-methods


B.

http enum


C.

http-headers


D.

http-git


Expert Solution
Questions # 17:

Which of the following is not a Bluetooth attack?

Options:

A.

Bluedriving


B.

Bluejacking


C.

Bluesmacking


D.

Bluesnarfing


Expert Solution
Questions # 18:

Which regulation defines security and privacy controls for Federal information systems and organizations?

Options:

A.

NIST-800-53


B.

PCI-DSS


C.

EU Safe Harbor


D.

HIPAA


Expert Solution
Questions # 19:

You've gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD. Which Linux based tool has the ability to change any user's password or to activate disabled Windows accounts?

Options:

A.

CHNTPW


B.

Cain & Abel


C.

SET


D.

John the Ripper


Expert Solution
Questions # 20:

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.

What is this type of attack (that can use either HTTP GET or HTTP POST) called?

Options:

A.

Cross-Site Request Forgery


B.

Cross-Site Scripting


C.

SQL Injection


D.

Browser Hacking


Expert Solution
Questions # 21:

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com ", that the user is directed to a phishing site.

Which file does the attacker need to modify?

Options:

A.

Hosts


B.

Sudoers


C.

Boot.ini


D.

Networks


Expert Solution
Questions # 22:

Using Windows CMD, how would an attacker list all the shares to which the current user context has access?

Options:

A.

NET USE


B.

NET CONFIG


C.

NET FILE


D.

NET VIEW


Expert Solution
Questions # 23:

> NMAP -sn 192.168.11.200-215

The NMAP command above performs which of the following?

Options:

A.

A ping scan


B.

A trace sweep


C.

An operating system detect


D.

A port scan


Expert Solution
Questions # 24:

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).

What is the best way to evade the NIDS?

Options:

A.

Encryption


B.

Protocol Isolation


C.

Alternate Data Streams


D.

Out of band signalling


Expert Solution
Questions # 25:

What is the process of logging, recording, and resolving events that take place in an organization?

Options:

A.

Incident Management Process


B.

Security Policy


C.

Internal Procedure


D.

Metrics


Expert Solution
Questions # 26:

You have successfully gained access to your client's internal network and successfully comprised a Linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled.

Which port would you see listening on these Windows machines in the network?

Options:

A.

445


B.

3389


C.

161


D.

1433


Expert Solution
Questions # 27:

A medium-sized healthcare IT business decides to implement a risk management strategy.

Which of the following is NOT one of the five basic responses to risk?

Options:

A.

Delegate


B.

Avoid


C.

Mitigate


D.

Accept


Expert Solution
Questions # 28:

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it.

What should you do?

Options:

A.

Forward the message to your company’s security response team and permanently delete the message from your computer.


B.

Reply to the sender and ask them for more information about the message contents.


C.

Delete the email and pretend nothing happened


D.

Forward the message to your supervisor and ask for her opinion on how to handle the situation


Expert Solution
Questions # 29:

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.

What type of attack is outlined in the scenario?

Options:

A.

Watering Hole Attack


B.

Heartbleed Attack


C.

Shellshock Attack


D.

Spear Phising Attack


Expert Solution
Questions # 30:

You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn't get any response back.

What is happening?

Options:

A.

ICMP could be disabled on the target server.


B.

The ARP is disabled on the target server.


C.

TCP/IP doesn't support ICMP.


D.

You need to run the ping command with root privileges.


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions