Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions
Questions # 31:

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

Options:

A.

tcp.dstport==514 && ip.dst==192.168.0.150


B.

tcp.srcport==514 && ip.src==192.168.0.99


C.

tcp.dstport==514 && ip.dst==192.168.0.0/16


D.

tcp.srcport==514 && ip.src==192.168.150


Expert Solution
Questions # 32:

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

Options:

A.

c:\compmgmt.msc


B.

c:\services.msc


C.

c:\ncpa.cp


D.

c:\gpedit


Expert Solution
Questions # 33:

Which of the following cryptography attack methods is usually performed without the use of a computer?

Options:

A.

Ciphertext-only attack


B.

Chosen key attack


C.

Rubber hose attack


D.

Rainbow table attack


Expert Solution
Questions # 34:

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

Options:

A.

SSL


B.

Mutual authentication


C.

IPSec


D.

Static IP addresses


Expert Solution
Questions # 35:

A security administrator notices that the log file of the company’s webserver contains suspicious entries:

Question # 35

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

Options:

A.

command injection.


B.

SQL injection.


C.

directory traversal.


D.

LDAP injection.


Expert Solution
Questions # 36:

Which of the following processes evaluates the adherence of an organization to its stated security policy?

Options:

A.

Vulnerability assessment


B.

Penetration testing


C.

Risk assessment


D.

Security auditing


Expert Solution
Questions # 37:

One way to defeat a multi-level security solution is to leak data via

Options:

A.

a bypass regulator.


B.

steganography.


C.

a covert channel.


D.

asymmetric routing.


Expert Solution
Questions # 38:

An attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?

Options:

A.

Classified


B.

Overt


C.

Encrypted


D.

Covert


Expert Solution
Questions # 39:

The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:

Question # 39

What is most likely taking place?

Options:

A.

Ping sweep of the 192.168.1.106 network


B.

Remote service brute force attempt


C.

Port scan of 192.168.1.106


D.

Denial of service attack on 192.168.1.106


Expert Solution
Questions # 40:

In order to show improvement of security over time, what must be developed?

Options:

A.

Reports


B.

Testing tools


C.

Metrics


D.

Taxonomy of vulnerabilities


Expert Solution
Questions # 41:

An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain management or control packets in the submitted traces. Which of the following is the most likely reason for lack of management or control packets?

Options:

A.

The wireless card was not turned on.


B.

The wrong network card drivers were in use by Wireshark.


C.

On Linux and Mac OS X, only 802.11 headers are received in promiscuous mode.


D.

Certain operating systems and adapters do not collect the management or control packets.


Expert Solution
Questions # 42:

Passive reconnaissance involves collecting information through which of the following?

Options:

A.

Social engineering


B.

Network traffic sniffing


C.

Man in the middle attacks


D.

Publicly accessible sources


Expert Solution
Questions # 43:

A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?

Options:

A.

Locate type=ns


B.

Request type=ns


C.

Set type=ns


D.

Transfer type=ns


Expert Solution
Questions # 44:

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?

Options:

A.

IP Security (IPSEC)


B.

Multipurpose Internet Mail Extensions (MIME)


C.

Pretty Good Privacy (PGP)


D.

Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)


Expert Solution
Questions # 45:

A botnet can be managed through which of the following?

Options:

A.

IRC


B.

E-Mail


C.

Linkedin and Facebook


D.

A vulnerable FTP server


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions