Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 11

Questions 151

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

Options:
A.

DataThief

B.

NetCat

C.

Cain and Abel

D.

SQLInjector

GAQM CPEH-001 Premium Access
Questions 152

The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:

CPEH-001 Question 152

What is most likely taking place?

Options:
A.

Ping sweep of the 192.168.1.106 network

B.

Remote service brute force attempt

C.

Port scan of 192.168.1.106

D.

Denial of service attack on 192.168.1.106

Questions 153

Which type of access control is used on a router or firewall to limit network activity?

Options:
A.

Mandatory

B.

Discretionary

C.

Rule-based

D.

Role-based

Questions 154

When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?

Options:
A.

Drops the packet and moves on to the next one

B.

Continues to evaluate the packet until all rules are checked

C.

Stops checking rules, sends an alert, and lets the packet continue

D.

Blocks the connection with the source IP address in the packet

Questions 155

What is the broadcast address for the subnet 190.86.168.0/22?

Options:
A.

190.86.168.255

B.

190.86.255.255

C.

190.86.171.255

D.

190.86.169.255

Questions 156

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

Options:
A.

white box

B.

grey box

C.

red box

D.

black box

Questions 157

Which of the following is a component of a risk assessment?

Options:
A.

Physical security

B.

Administrative safeguards

C.

DMZ

D.

Logical interface

Questions 158

Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

Options:
A.

Fast processor to help with network traffic analysis

B.

They must be dual-homed

C.

Similar RAM requirements

D.

Fast network interface cards

Questions 159

While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?

Options:
A.

Packet filtering firewall

B.

Application-level firewall

C.

Circuit-level gateway firewall

D.

Stateful multilayer inspection firewall

Questions 160

What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?

Options:
A.

Blue Book

B.

ISO 26029

C.

Common Criteria

D.

The Wassenaar Agreement

Questions 161

A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?

Options:
A.

Say nothing and continue with the security testing.

B.

Stop work immediately and contact the authorities.

C.

Delete the pornography, say nothing, and continue security testing.

D.

Bring the discovery to the financial organization's human resource department.

Questions 162

Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

Options:
A.

It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.

B.

If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.

C.

Hashing is faster compared to more traditional encryption algorithms.

D.

Passwords stored using hashes are non-reversible, making finding the password much more difficult.

Questions 163

Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?

Options:
A.

Incident response services to any user, company, government agency, or organization in partnership with the Department of Homeland Security

B.

Maintenance of the nation’s Internet infrastructure, builds out new Internet infrastructure, and decommissions old Internet infrastructure

C.

Registration of critical penetration testing for the Department of Homeland Security and public and private sectors

D.

Measurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department, as well as private sectors

Questions 164

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

Options:
A.

Sender's public key

B.

Receiver's private key

C.

Receiver's public key

D.

Sender's private key

Questions 165

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

Options:
A.

SHA-1

B.

MD5

C.

HAVAL

D.

MD4