New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 2 Question 22 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 22
Topic #: 2
[All CPEH-001 Questions]

If you come across a sheepdip machine at your client's site, what should you do?

Show Suggested Answer Hide Answer
Suggested Answer: A

Also known as a footbath, a sheepdip is the process of checking physical media, such as floppy disks or CD-ROMs, for viruses before they are used in a computer. Typically, a computer that sheepdips is used only for that process and nothing else and is isolated from the other computers, meaning it is not connected to the network. Most sheepdips use at least two different antivirus programs in order to increase effectiveness.


Contribute your Thoughts:

0/2000 characters
Mayra
4 months ago
Really? I’ve never heard of it deferring a DoS attack.
upvoted 0 times
...
Nada
4 months ago
C is the right answer, it coordinates multiple honeypots.
upvoted 0 times
...
Verona
4 months ago
Wait, I thought it was just a fancy term for a honeypot?
upvoted 0 times
...
Eun
4 months ago
Totally agree, it's more than just a virus scanner!
upvoted 0 times
...
Carissa
5 months ago
A sheepdip is used for isolating systems, not just virus-checking.
upvoted 0 times
...
Ira
5 months ago
I thought sheepdip was related to preventing attacks, but I can't remember if it specifically defers denial of service attacks.
upvoted 0 times
...
Detra
5 months ago
I feel like option C sounds familiar, but I might be mixing it up with something else.
upvoted 0 times
...
Dorcas
5 months ago
I think I came across a similar question about honeypots in our practice tests, but I can't recall if sheepdip is the same thing.
upvoted 0 times
...
Robt
5 months ago
I remember studying that sheepdip machines are used for isolating and scanning systems, but I'm not sure which option fits best.
upvoted 0 times
...
Kina
5 months ago
This question seems straightforward - it's asking about guidelines to prevent insider attacks by privileged users. I'll need to carefully read through the options and think about which one best addresses the issue.
upvoted 0 times
...
Graham
5 months ago
I'm pretty sure the transaction command automatically creates fields like duration and eventcount, so I think the answer is A. maxcount.
upvoted 0 times
...

Save Cancel