Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions
Questions # 46:

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

Options:

A.

Using the Metasploit psexec module setting the SA / Admin credential


B.

Invoking the stored procedure xp_shell to spawn a Windows command shell


C.

Invoking the stored procedure cmd_shell to spawn a Windows command shell


D.

Invoking the stored procedure xp_cmdshell to spawn a Windows command shell


Expert Solution
Questions # 47:

What is the main reason the use of a stored biometric is vulnerable to an attack?

Options:

A.

The digital representation of the biometric might not be unique, even if the physical characteristic is unique.


B.

Authentication using a stored biometric compares a copy to a copy instead of the original to a copy.


C.

A stored biometric is no longer "something you are" and instead becomes "something you have".


D.

A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric.


Expert Solution
Questions # 48:

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

Options:

A.

Port scanning


B.

Banner grabbing


C.

Injecting arbitrary data


D.

Analyzing service response


Expert Solution
Questions # 49:

Which of the following does proper basic configuration of snort as a network intrusion detection system require?

Options:

A.

Limit the packets captured to the snort configuration file.


B.

Capture every packet on the network segment.


C.

Limit the packets captured to a single segment.


D.

Limit the packets captured to the /var/log/snort directory.


Expert Solution
Questions # 50:

What is the broadcast address for the subnet 190.86.168.0/22?

Options:

A.

190.86.168.255


B.

190.86.255.255


C.

190.86.171.255


D.

190.86.169.255


Expert Solution
Questions # 51:

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?

Options:

A.

Information reporting


B.

Vulnerability assessment


C.

Active information gathering


D.

Passive information gathering


Expert Solution
Questions # 52:

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

Options:

A.

Usernames


B.

File permissions


C.

Firewall rulesets


D.

Passwords


Expert Solution
Questions # 53:

Which of the following techniques will identify if computer files have been changed?

Options:

A.

Network sniffing


B.

Permission sets


C.

Integrity checking hashes


D.

Firewall alerts


Expert Solution
Questions # 54:

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

Options:

A.

DataThief


B.

NetCat


C.

Cain and Abel


D.

SQLInjector


Expert Solution
Questions # 55:

Which of the following items of a computer system will an anti-virus program scan for viruses?

Options:

A.

Boot Sector


B.

Deleted Files


C.

Windows Process List


D.

Password Protected Files


Expert Solution
Questions # 56:

A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:

Question # 56

The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?

Options:

A.

Permit 217.77.88.0/24 11.12.13.0/24 RDP 3389


B.

Permit 217.77.88.12 11.12.13.50 RDP 3389


C.

Permit 217.77.88.12 11.12.13.0/24 RDP 3389


D.

Permit 217.77.88.0/24 11.12.13.50 RDP 3389


Expert Solution
Questions # 57:

Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?

Options:

A.

NMAP -PN -A -O -sS 192.168.2.0/24


B.

NMAP -P0 -A -O -p1-65535 192.168.0/24


C.

NMAP -P0 -A -sT -p0-65535 192.168.0/16


D.

NMAP -PN -O -sS -p 1-1024 192.168.0/8


Expert Solution
Questions # 58:

Which type of scan measures a person's external features through a digital video camera?

Options:

A.

Iris scan


B.

Retinal scan


C.

Facial recognition scan


D.

Signature kinetics scan


Expert Solution
Questions # 59:

A security policy will be more accepted by employees if it is consistent and has the support of

Options:

A.

coworkers.


B.

executive management.


C.

the security officer.


D.

a supervisor.


Expert Solution
Questions # 60:

When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

Options:

A.

A bottom-up approach


B.

A top-down approach


C.

A senior creation approach


D.

An IT assurance approach


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions