Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following programming languages is most vulnerable to buffer overflow attacks?

Options:

A.

Perl


B.

C++


C.

Python


D.

Java


Expert Solution
Questions # 62:

Smart cards use which protocol to transfer the certificate in a secure manner?

Options:

A.

Extensible Authentication Protocol (EAP)


B.

Point to Point Protocol (PPP)


C.

Point to Point Tunneling Protocol (PPTP)


D.

Layer 2 Tunneling Protocol (L2TP)


Expert Solution
Questions # 63:

Which of the following parameters enables NMAP's operating system detection feature?

Options:

A.

NMAP -sV


B.

NMAP -oS


C.

NMAP -sR


D.

NMAP -O


Expert Solution
Questions # 64:

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

Options:

A.

Physical


B.

Procedural


C.

Technical


D.

Compliance


Expert Solution
Questions # 65:

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

Options:

A.

SHA-1


B.

MD5


C.

HAVAL


D.

MD4


Expert Solution
Questions # 66:

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

Options:

A.

Hping


B.

Traceroute


C.

TCP ping


D.

Broadcast ping


Expert Solution
Questions # 67:

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?

Options:

A.

Sarbanes-Oxley Act (SOX)


B.

Gramm-Leach-Bliley Act (GLBA)


C.

Fair and Accurate Credit Transactions Act (FACTA)


D.

Federal Information Security Management Act (FISMA)


Expert Solution
Questions # 68:

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

Options:

A.

Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.


B.

Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.


C.

Configure the firewall to allow traffic on TCP port 53.


D.

Configure the firewall to allow traffic on TCP port 8080.


Expert Solution
Questions # 69:

Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?

Options:

A.

MD5


B.

SHA-1


C.

RC4


D.

MD4


Expert Solution
Questions # 70:

Advanced encryption standard is an algorithm used for which of the following?

Options:

A.

Data integrity


B.

Key discovery


C.

Bulk data encryption


D.

Key recovery


Expert Solution
Questions # 71:

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?

Options:

A.

Truecrypt


B.

Sub7


C.

Nessus


D.

Clamwin


Expert Solution
Questions # 72:

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

Options:

A.

Birthday attack


B.

Plaintext attack


C.

Meet in the middle attack


D.

Chosen ciphertext attack


Expert Solution
Questions # 73:

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

Options:

A.

Legal, performance, audit


B.

Audit, standards based, regulatory


C.

Contractual, regulatory, industry


D.

Legislative, contractual, standards based


Expert Solution
Questions # 74:

Which of the following is an example of IP spoofing?

Options:

A.

SQL injections


B.

Man-in-the-middle


C.

Cross-site scripting


D.

ARP poisoning


Expert Solution
Questions # 75:

Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

Options:

A.

The root CA is the recovery agent used to encrypt data when a user's certificate is lost.


B.

The root CA stores the user's hash value for safekeeping.


C.

The CA is the trusted root that issues certificates.


D.

The root CA is used to encrypt email messages to prevent unintended disclosure of data.


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions