Showing 1–20 of 27 resultsSorted by latest
Username or email address *
Password *
Log in
Lost your password? Remember me
No account yet?
cpeh-001
Practice makes perfect! Take this quiz now to test your knowledge and boost your confidence for the real exam.
1 / 9
Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity?
2 / 9
What type of attack is shown in the following diagram?
3 / 9
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization. How would you prevent such type of attacks?
4 / 9
Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him ''just to double check our records.'' Jane does not suspect anything amiss, and parts with her password. Jack can now access Brown Co.'s computers with a valid user name and password, to steal the cookie recipe. What kind of attack is being illustrated here? E. Faking Identity
5 / 9
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
6 / 9
This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.
7 / 9
Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database? system users from gaining access privilege of the database target system
8 / 9
How do you defend against ARP Spoofing? Select three.
ARPwall is used in protecting against ARP spoofing. Incorrect answer: IDS option may works fine in case of monitoring the traffic from outside the network but not from internal hosts.
9 / 9
This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the network. What is this technique called?
Your score is
Restart quiz