Certified Ethical Hacker – CEH – 312-50 – Question184

Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?


A.
CSIRT provides an incident response service to enable a reliable and trusted single point of contact for reporting computer security incidents worldwide.
B. CSIRT provides a computer security surveillance service to supply a government with important intelligence information on individuals travelling abroad.
C. CSIRT provides a penetration testing service to support exception reporting on incidents worldwide by individuals and multi-national corporations.
D. CSIRT provides a vulnerability assessment service to assist law enforcement agencies with profiling an individual's property or company's asset.

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question183

An IT security engineer notices that the companys web server is currently being hacked. What should the engineer do next?


A.
Unplug the network connection on the companys web server.
B. Determine the origin of the attack and launch a counterattack.
C. Record as much information as possible from the attack.
D. Perform a system restart on the companys web server.

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question182

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?


A.
Investigate based on the maintenance schedule of the affected systems.
B. Investigate based on the service level agreements of the systems.
C. Investigate based on the potential effect of the incident.
D. Investigate based on the order that the alerts arrived in.

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question176

When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?


A.
The key entered is a symmetric key used to encrypt the wireless data.
B. The key entered is a hash that is used to prove the integrity of the wireless data.
C. The key entered is based on the Diffie-Hellman method.
D. The key is an RSA key used to encrypt the wireless data.

Correct Answer: A