Pass the GAQM Information Systems Security CPEH-001 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions
Questions # 121:

What is the role of test automation in security testing?

Options:

A.

It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.


B.

It is an option but it tends to be very expensive.


C.

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.


D.

Test automation is not usable in security due to the complexity of the tests.


Expert Solution
Questions # 122:

Attempting an injection attack on a web server based on responses to True/False questions is called which of the following?

Options:

A.

Blind SQLi


B.

DMS-specific SQLi


C.

Classic SQLi


D.

Compound SQLi


Expert Solution
Questions # 123:

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Scalability


B.

Speed


C.

Key distribution


D.

Security


Expert Solution
Questions # 124:

Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report?

Options:

A.

a port scanner


B.

a vulnerability scanner


C.

a virus scanner


D.

a malware scanner


Expert Solution
Questions # 125:

A well-intentioned researcher discovers a vulnerability on the web site of a major corporation. What should he do?

Options:

A.

Ignore it.


B.

Try to sell the information to a well-paying party on the dark web.


C.

Notify the web site owner so that corrective action be taken as soon as possible to patch the vulnerability.


D.

Exploit the vulnerability without harming the web site owner so that attention be drawn to the problem.


Expert Solution
Questions # 126:

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Options:

A.

tcptrace


B.

tcptraceroute


C.

Nessus


D.

OpenVAS


Expert Solution
Questions # 127:

Websites and web portals that provide web services commonly use the Simple Object Access Protocol SOAP. Which of the following is an incorrect definition or characteristics in the protocol?

Options:

A.

Based on XML


B.

Provides a structured model for messaging


C.

Exchanges data between web services


D.

Only compatible with the application protocol HTTP


Expert Solution
Questions # 128:

A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?

Options:

A.

The password file does not contain the passwords themselves.


B.

He can open it and read the user ids and corresponding passwords.


C.

The file reveals the passwords to the root user only.


D.

He cannot read it because it is encrypted.


Expert Solution
Questions # 129:

In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?

Options:

A.

Implementing IPv4 security in a dual-stack network offers protection from IPv6 attacks too.


B.

Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical.


C.

Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addresses.


D.

Vulnerabilities in the application layer are greatly different from IPv4.


Expert Solution
Questions # 130:

Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?

Options:

A.

http-git


B.

http-headers


C.

http enum


D.

http-methods


Expert Solution
Questions # 131:

You want to analyze packets on your wireless network. Which program would you use?

Options:

A.

Wireshark with Airpcap


B.

Airsnort with Airpcap


C.

Wireshark with Winpcap


D.

Ethereal with Winpcap


Expert Solution
Questions # 132:

A specific site received 91 ICMP_ECHO packets within 90 minutes from 47 different sites.

77 of the ICMP_ECHO packets had an ICMP ID:39612 and Seq:57072. 13 of the ICMP_ECHO packets had an ICMP ID:0 and Seq:0. What can you infer from this information?

Options:

A.

The packets were sent by a worm spoofing the IP addresses of 47 infected sites


B.

ICMP ID and Seq numbers were most likely set by a tool and not by the operating system


C.

All 77 packets came from the same LAN segment and hence had the same ICMP ID and Seq number


D.

13 packets were from an external network and probably behind a NAT, as they had an ICMP ID 0 and Seq 0


Expert Solution
Questions # 133:

(Note: the student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.). Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal?

What is odd about this attack? Choose the best answer.

Question # 133

Options:

A.

This is not a spoofed packet as the IP stack has increasing numbers for the three flags.


B.

This is back orifice activity as the scan comes from port 31337.


C.

The attacker wants to avoid creating a sub-carries connection that is not normally valid.


D.

These packets were crafted by a tool, they were not created by a standard IP stack.


Expert Solution
Questions # 134:

A new wireless client that is 802.11 compliant cannot connect to a wireless network given that the client can see the network and it has compatible hardware and software installed. Upon further tests and investigation, it was found out that the Wireless Access Point (WAP) was not responding to the association requests being sent by the wireless client. What MOST likely is the issue on this scenario?

Options:

A.

The client cannot see the SSID of the wireless network


B.

The WAP does not recognize the client’s MAC address.


C.

The wireless client is not configured to use DHCP.


D.

Client is configured for the wrong channel


Expert Solution
Questions # 135:

Your next door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the network's SSID and password and you hear them both clearly. What do you do with this information?

Options:

A.

Nothing, but suggest to him to change the network's SSID and password.


B.

Sell his SSID and password to friends that come to your house, so it doesn't slow down your network.


C.

Log onto to his network, after all it's his fault that you can get in.


D.

Only use his network when you have large downloads so you don't tax your own network.


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions