Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 2

Questions 16

Which of the following security operations is used for determining the attack surface of an organization?

Options:
A.

Running a network scan to detect network services in the corporate DMZ

B.

Training employees on the security policy regarding social engineering

C.

Reviewing the need for a security clearance for each employee

D.

Using configuration management to determine when and where to apply security patches

GAQM CPEH-001 Premium Access
Questions 17

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Options:
A.

A biometric system that bases authentication decisions on behavioral attributes.

B.

A biometric system that bases authentication decisions on physical attributes.

C.

An authentication system that creates one-time passwords that are encrypted with secret keys.

D.

An authentication system that uses passphrases that are converted into virtual passwords.

Questions 18

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?

Options:
A.

Only using OSPFv3 will mitigate this risk.

B.

Make sure that legitimate network routers are configured to run routing protocols with authentication.

C.

Redirection of the traffic cannot happen unless the admin allows it explicitly.

D.

Disable all routing protocols and only use static routes.

Questions 19

You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?

Options:
A.

Network-based IDS

B.

Firewall

C.

Proxy

D.

Host-based IDS

Questions 20

The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?

Options:
A.

RST

B.

ACK

C.

SYN-ACK

D.

SYN

Questions 21

In order to have an anonymous Internet surf, which of the following is best choice?

Options:
A.

Use SSL sites when entering personal information

B.

Use Tor network with multi-node

C.

Use shared WiFi

D.

Use public VPN

Questions 22

Eve stole a file named secret.txt, transferred it to her computer and she just entered these commands:

CPEH-001 Question 22

What is she trying to achieve?

Options:
A.

She is encrypting the file.

B.

She is using John the Ripper to view the contents of the file.

C.

She is using ftp to transfer the file to another hacker named John.

D.

She is using John the Ripper to crack the passwords in the secret.txt file.

Questions 23

Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

Options:
A.

Password protected files

B.

Hidden folders

C.

BIOS password

D.

Full disk encryption.

Questions 24

In cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case.

Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It was written by sysinternals and has been integrated within the framework. Often as penetration testers, successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values.

Which of the following is true hash type and sort order that is using in the psexec module's 'smbpass'?

Options:
A.

NT:LM

B.

LM:NT

C.

LM:NTLM

D.

NTLM:LM

Questions 25

By using a smart card and pin, you are using a two-factor authentication that satisfies

Options:
A.

Something you know and something you are

B.

Something you have and something you know

C.

Something you have and something you are

D.

Something you are and something you remember

Questions 26

Which Intrusion Detection System is best applicable for large environments where critical assets on the network need extra security and is ideal for observing sensitive network segments?

Options:
A.

Network-based intrusion detection system (NIDS)

B.

Host-based intrusion detection system (HIDS)

C.

Firewalls

D.

Honeypots

Questions 27

Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?

Options:
A.

Fuzzy-testing the code

B.

Third party running the code

C.

Sandboxing the code

D.

String validating the code

Questions 28

Which of these options is the most secure procedure for storing backup tapes?

Options:
A.

In a climate controlled facility offsite

B.

On a different floor in the same building

C.

Inside the data center for faster retrieval in a fireproof safe

D.

In a cool dry environment

Questions 29

Seth is starting a penetration test from inside the network. He hasn't been given any information about the network. What type of test is he conducting?

Options:
A.

Internal Whitebox

B.

External, Whitebox

C.

Internal, Blackbox

D.

External, Blackbox

Questions 30

You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?

Options:
A.

False Negative

B.

False Positive

C.

True Negative

D.

True Positive