Free CEH-001 Exam Braindumps (page: 74)

Page 73 of 220

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

  1. Birthday attack
  2. Plaintext attack
  3. Meet in the middle attack
  4. Chosen ciphertext attack

Answer(s): D



Low humidity in a data center can cause which of the following problems?

  1. Heat
  2. Corrosion
  3. Static electricity
  4. Airborne contamination

Answer(s): C



Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

  1. Key registry
  2. Recovery agent
  3. Directory
  4. Key escrow

Answer(s): D



Which tool would be used to collect wireless packet data?

  1. NetStumbler
  2. John the Ripper
  3. Nessus
  4. Netcat

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts