Free CEH-001 Exam Braindumps (page: 40)

Page 39 of 220

Which port, when configured on a switch receives a copy of every packet that passes through it?

  1. R-DUPE Port
  2. MIRROR port
  3. SPAN port
  4. PORTMON

Answer(s): C



What is the IV key size used in WPA2?

  1. 32
  2. 24
  3. 16
  4. 48
  5. 128

Answer(s): D

Explanation:

Every WPA key includes a 48 bit IV key, which creates 500 trillion combinations and is a stronger encryption compared to WEP. With so many combinations, the possibility of the encryption key reuse is lesser and therefore the encryption can endure hacking attacks better than WEP. WPA does not make direct use of the master encryption keys and has a message integrity checking facility.



What type of session hijacking attack is shown in the exhibit?

  1. Session Sniffing Attack
  2. Cross-site scripting Attack
  3. SQL Injection Attack
  4. Token sniffing Attack

Answer(s): A



What is the default Password Hash Algorithm used by NTLMv2?

  1. MD4
  2. DES
  3. SHA-1
  4. MD5

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts