Free CEH-001 Exam Braindumps (page: 75)

Page 74 of 220

Which of the following processes evaluates the adherence of an organization to its stated security policy?

  1. Vulnerability assessment
  2. Penetration testing
  3. Risk assessment
  4. Security auditing

Answer(s): D



Which of the following statements are true regarding N-tier architecture? (Choose two.)

  1. Each layer must be able to exist on a physically independent system.
  2. The N-tier architecture must have at least one logical layer.
  3. Each layer should exchange information only with the layers above and below it.
  4. When a layer is changed or updated, the other layers must also be recompiled or modified.

Answer(s): A,C



Some passwords are stored using specialized encryption algorithms known as hashes.
Why is this an appropriate method?

  1. It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.
  2. If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.
  3. Hashing is faster compared to more traditional encryption algorithms.
  4. Passwords stored using hashes are non-reversible, making finding the password much more difficult.

Answer(s): D



What is the main disadvantage of the scripting languages as opposed to compiled programming languages?

  1. Scripting languages are hard to learn.
  2. Scripting languages are not object-oriented.
  3. Scripting languages cannot be used to create graphical user interfaces.
  4. Scripting languages are slower because they require an interpreter to run the code.

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts