Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following items is unique to the N-tier architecture method of designing software applications?

Options:

A.

Application layers can be separated, allowing each layer to be upgraded independently from other layers.


B.

It is compatible with various databases including Access, Oracle, and SQL.


C.

Data security is tied into each layer and must be updated for all layers when any upgrade is performed.


D.

Application layers can be written in C, ASP.NET, or Delphi without any performance loss.


Expert Solution
Questions # 92:

What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?

Options:

A.

Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient communication.


B.

To get messaging programs to function with this algorithm requires complex configurations.


C.

It has been proven to be a weak cipher; therefore, should not be trusted to protect sensitive data.


D.

It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.


Expert Solution
Questions # 93:

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

Options:

A.

Sender's public key


B.

Receiver's private key


C.

Receiver's public key


D.

Sender's private key


Expert Solution
Questions # 94:

Which of the following guidelines or standards is associated with the credit card industry?

Options:

A.

Control Objectives for Information and Related Technology (COBIT)


B.

Sarbanes-Oxley Act (SOX)


C.

Health Insurance Portability and Accountability Act (HIPAA)


D.

Payment Card Industry Data Security Standards (PCI DSS)


Expert Solution
Questions # 95:

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is

Options:

A.

OWASP is for web applications and OSSTMM does not include web applications.


B.

OSSTMM is gray box testing and OWASP is black box testing.


C.

OWASP addresses controls and OSSTMM does not.


D.

OSSTMM addresses controls and OWASP does not.


Expert Solution
Questions # 96:

Which initial procedure should an ethical hacker perform after being brought into an organization?

Options:

A.

Begin security testing.


B.

Turn over deliverables.


C.

Sign a formal contract with non-disclosure.


D.

Assess what the organization is trying to protect.


Expert Solution
Questions # 97:

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?

Options:

A.

Vulnerability scanner


B.

Protocol analyzer


C.

Port scanner


D.

Intrusion Detection System


Expert Solution
Questions # 98:

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

Options:

A.

Burp Suite


B.

OpenVAS


C.

tshark


D.

Kismet


Expert Solution
Questions # 99:

What is the most common method to exploit the “Bash Bug” or “ShellShock" vulnerability?

Options:

A.

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server


B.

Manipulate format strings in text fields


C.

SSH


D.

SYN Flood


Expert Solution
Questions # 100:

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.

What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

Options:

A.

Protocol analyzer


B.

Intrusion Prevention System (IPS)


C.

Network sniffer


D.

Vulnerability scanner


Expert Solution
Questions # 101:

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Options:

A.

Application Layer


B.

Data tier


C.

Presentation tier


D.

Logic tier


Expert Solution
Questions # 102:

Due to a slowdown of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?

Options:

A.

All of the employees would stop normal work activities


B.

IT department would be telling employees who the boss is


C.

Not informing the employees that they are going to be monitored could be an invasion of privacy.


D.

The network could still experience traffic slow down.


Expert Solution
Questions # 103:

Which of the following statements regarding ethical hacking is incorrect?

Options:

A.

Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization's systems.


B.

Testing should be remotely performed offsite.


C.

An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.


D.

Ethical hacking should not involve writing to or modifying the target systems.


Expert Solution
Questions # 104:

You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?

Options:

A.

False Negative


B.

False Positive


C.

True Negative


D.

True Positive


Expert Solution
Questions # 105:

The company ABC recently discovered that their new product was released by the opposition before their premiere. They contract an investigator who discovered that the maid threw away papers with confidential information about the new product and the opposition found it in the garbage. What is the name of the technique used by the opposition?

Options:

A.

Hack attack


B.

Sniffing


C.

Dumpster diving


D.

Spying


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions