Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Information Systems Security CPEH-001 GAQM Study Notes

Page: 12 / 27
Question 48

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing?

Options:

A.

Install DNS logger and track vulnerable packets

B.

Disable DNS timeouts

C.

Install DNS Anti-spoofing

D.

Disable DNS Zone Transfer

Question 49

Which of the following parameters describe LM Hash (see exhibit):

Exhibit:

Options:

A.

I, II, and III

B.

I

C.

II

D.

I and II

Question 50

This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Which of the following tools is being described?

Options:

A.

Aircrack-ng

B.

Airguard

C.

WLAN-crack

D.

wificracker

Question 51

What is the process of logging, recording, and resolving events that take place in an organization?

Options:

A.

Incident Management Process

B.

Security Policy

C.

Internal Procedure

D.

Metrics

Page: 12 / 27
Exam Code: CPEH-001
Exam Name: Certified Professional Ethical Hacker (CPEH)
Last Update: Nov 7, 2024
Questions: 736
CPEH-001 pdf

CPEH-001 PDF

$28  $80
CPEH-001 Engine

CPEH-001 Testing Engine

$33.25  $95
CPEH-001 PDF + Engine

CPEH-001 PDF + Testing Engine

$45.5  $130