Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which element of Public Key Infrastructure (PKI) verifies the applicant?

Options:

A.

Certificate authority


B.

Validation authority


C.

Registration authority


D.

Verification authority


Expert Solution
Questions # 77:

Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

Options:

A.

It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.


B.

If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.


C.

Hashing is faster compared to more traditional encryption algorithms.


D.

Passwords stored using hashes are non-reversible, making finding the password much more difficult.


Expert Solution
Questions # 78:

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

Options:

A.

An extensible security framework named COBIT


B.

A list of flaws and how to fix them


C.

Web application patches


D.

A security certification for hardened web applications


Expert Solution
Questions # 79:

An IT security engineer notices that the company’s web server is currently being hacked. What should the engineer do next?

Options:

A.

Unplug the network connection on the company’s web server.


B.

Determine the origin of the attack and launch a counterattack.


C.

Record as much information as possible from the attack.


D.

Perform a system restart on the company’s web server.


Expert Solution
Questions # 80:

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

Options:

A.

Key registry


B.

Recovery agent


C.

Directory


D.

Key escrow


Expert Solution
Questions # 81:

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

Options:

A.

Public key


B.

Private key


C.

Modulus length


D.

Email server certificate


Expert Solution
Questions # 82:

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

Options:

A.

Public-key cryptosystems are faster than symmetric-key cryptosystems.


B.

Public-key cryptosystems distribute public-keys within digital signatures.


C.

Public-key cryptosystems do not require a secure key distribution channel.


D.

Public-key cryptosystems do not provide technical non-repudiation via digital signatures.


Expert Solution
Questions # 83:

How do employers protect assets with security policies pertaining to employee surveillance activities?

Options:

A.

Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.


B.

Employers use informal verbal communication channels to explain employee monitoring activities to employees.


C.

Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.


D.

Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.


Expert Solution
Questions # 84:

Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?

Options:

A.

Regulatory compliance


B.

Peer review


C.

Change management


D.

Penetration testing


Expert Solution
Questions # 85:

A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?

Options:

A.

Ignore the problem completely and let someone else deal with it.


B.

Create a document that will crash the computer when opened and send it to friends.


C.

Find an underground bulletin board and attempt to sell the bug to the highest bidder.


D.

Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.


Expert Solution
Questions # 86:

Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network’s IDS?

Options:

A.

Timing options to slow the speed that the port scan is conducted


B.

Fingerprinting to identify which operating systems are running on the network


C.

ICMP ping sweep to determine which hosts on the network are not available


D.

Traceroute to control the path of the packets sent during the scan


Expert Solution
Questions # 87:

Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?

Options:

A.

RSA 1024 bit strength


B.

AES 1024 bit strength


C.

RSA 512 bit strength


D.

AES 512 bit strength


Expert Solution
Questions # 88:

International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining

Options:

A.

guidelines and practices for security controls.


B.

financial soundness and business viability metrics.


C.

standard best practice for configuration management.


D.

contract agreement writing standards.


Expert Solution
Questions # 89:

Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?

Options:

A.

WebBugs


B.

WebGoat


C.

VULN_HTML


D.

WebScarab


Expert Solution
Questions # 90:

A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?

Options:

A.

Say nothing and continue with the security testing.


B.

Stop work immediately and contact the authorities.


C.

Delete the pornography, say nothing, and continue security testing.


D.

Bring the discovery to the financial organization's human resource department.


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions