Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 12

Questions 166

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?

Options:
A.

Truecrypt

B.

Sub7

C.

Nessus

D.

Clamwin

GAQM CPEH-001 Premium Access
Questions 167

A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?

Options:
A.

Say no; the friend is not the owner of the account.

B.

Say yes; the friend needs help to gather evidence.

C.

Say yes; do the job for free.

D.

Say no; make sure that the friend knows the risk she’s asking the CEH to take.

Questions 168

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

Options:
A.

Hping

B.

Traceroute

C.

TCP ping

D.

Broadcast ping

Questions 169

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

Options:
A.

Public-key cryptosystems are faster than symmetric-key cryptosystems.

B.

Public-key cryptosystems distribute public-keys within digital signatures.

C.

Public-key cryptosystems do not require a secure key distribution channel.

D.

Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

Questions 170

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

Options:
A.

Birthday attack

B.

Plaintext attack

C.

Meet in the middle attack

D.

Chosen ciphertext attack

Questions 171

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?

Options:
A.

Investigate based on the maintenance schedule of the affected systems.

B.

Investigate based on the service level agreements of the systems.

C.

Investigate based on the potential effect of the incident.

D.

Investigate based on the order that the alerts arrived in.

Questions 172

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

Options:
A.

Public key

B.

Private key

C.

Modulus length

D.

Email server certificate

Questions 173

Which statement best describes a server type under an N-tier architecture?

Options:
A.

A group of servers at a specific layer

B.

A single server with a specific role

C.

A group of servers with a unique role

D.

A single server at a specific layer

Questions 174

Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

Options:
A.

Ping of death

B.

SYN flooding

C.

TCP hijacking

D.

Smurf attack

Questions 175

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

Options:
A.

Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.

B.

Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.

C.

Configure the firewall to allow traffic on TCP port 53.

D.

Configure the firewall to allow traffic on TCP port 8080.

Questions 176

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

Options:
A.

An extensible security framework named COBIT

B.

A list of flaws and how to fix them

C.

Web application patches

D.

A security certification for hardened web applications

Questions 177

Which of the following is optimized for confidential communications, such as bidirectional voice and video?

Options:
A.

RC4

B.

RC5

C.

MD4

D.

MD5

Questions 178

To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?

Options:
A.

Harvesting

B.

Windowing

C.

Hardening

D.

Stealthing

Questions 179

Which initial procedure should an ethical hacker perform after being brought into an organization?

Options:
A.

Begin security testing.

B.

Turn over deliverables.

C.

Sign a formal contract with non-disclosure.

D.

Assess what the organization is trying to protect.

Questions 180

Which type of security document is written with specific step-by-step details?

Options:
A.

Process

B.

Procedure

C.

Policy

D.

Paradigm