CEH Certified Ethical Hacker Bundle by Matt Walker

CEH Certified Ethical Hacker Bundle by Matt Walker

Author:Matt Walker
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2017-02-04T16:00:00+00:00


Questions

1. Which of the following attacks acts as a man-in-the-middle, exploiting fallback mechanisms in TLS clients?

A. POODLE

B. Heartbleed

C. FREAK

D. DROWN

2. RC4 is a simple, fast encryption cipher. Which of the following is not true regarding RC4?

A. RC4 can be used for web encryption.

B. RC4 uses block encryption.

C. RC4 is a symmetric encryption cipher.

D. RC4 can be used for file encryption.

3. An organization has decided upon AES with a 256-bit key to secure data exchange. What is the primary consideration for this?

A. AES is slow.

B. The key size makes data exchange bulky and complex.

C. It uses a shared key for encryption.

D. AES is a weak cypher.

4. Joe and Bob are both ethical hackers and have gained access to a folder. Joe has several encrypted files from the folder, and Bob has found one of them unencrypted. Which of the following is the best attack vector for them to follow?

A. Cipher text only

B. Known plain text

C. Chosen cipher text

D. Replay

5. You are reviewing security plans and policies, and you wish to provide protection to organization laptops. Which effort listed protects system folders, files, and MBR until valid credentials are provided at pre-boot?

A. Cloud computing

B. SSL/TLS

C. Full disk encryption

D. AES

6. Which of the following is used to distribute a public key within the PKI system, verifying the user’s identity to the recipient?

A. Digital signature

B. Hash value

C. Private key

D. Digital certificate

7. A hacker feeds plain-text files into a hash, eventually finding two or more that create the same fixed-value hash result. This anomaly is known as what?

A. Collision

B. Chosen plain text

C. Hash value compromise

D. Known plain text

8. An attacker uses a Metasploit auxiliary exploit to send a series of small messages to a server at regular intervals. The server responds with 64 bytes of data from its memory. Which of the following best describes the attack being used?

A. POODLE

B. Heartbleed

C. FREAK

D. DROWN

9. Which of the following statements is true regarding encryption algorithms?

A. Symmetric algorithms are slower, are good for bulk encryption, and have no scalability problems.

B. Symmetric algorithms are faster, are good for bulk encryption, and have no scalability problems.

C. Symmetric algorithms are faster, are good for bulk encryption, but have scalability problems.

D. Symmetric algorithms are faster but have scalability problems and are not suited for bulk encryption.

10. Within a PKI system, Joe encrypts a message for Bob and sends it. Bob receives the message and decrypts the message using what?

A. Joe’s public key

B. Joe’s private key

C. Bob’s public key

D. Bob’s private key

11. Which of the following is a symmetric encryption method that transforms a fixed-length amount of plain text into an encrypted version of the same length?

A. Stream

B. Block

C. Bit

D. Hash

12. Which symmetric algorithm uses variable block sizes (from 32 to 128 bits)?

A. DES

B. 3DES

C. RC

D. MD5

13. Which hash algorithm produces a 160-bit output value?

A. SHA-1

B. SHA-2

C. Diffie-Hellmann

D. MD5

14. Two different organizations have their own public key infrastructure up and running. When the two companies merged, security personnel wanted both PKIs to validate certificates from each other. What must the CAs for both companies establish to accomplish this?

A.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12593)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6424)
Kotlin in Action by Dmitry Jemerov(5074)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3852)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3092)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2613)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2360)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2267)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2267)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2141)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2082)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2002)