Free CEH-001 Exam Braindumps (page: 82)

Page 81 of 220

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

  1. Sender's public key
  2. Receiver's private key
  3. Receiver's public key
  4. Sender's private key

Answer(s): D



Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?

  1. Penetration testing
  2. Social engineering
  3. Vulnerability scanning
  4. Access control list reviews

Answer(s): A



When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?

  1. Network tap
  2. Layer 3 switch
  3. Network bridge
  4. Application firewall

Answer(s): A



How does an operating system protect the passwords used for account logins?

  1. The operating system performs a one-way hash of the passwords.
  2. The operating system stores the passwords in a secret file that users cannot find.
  3. The operating system encrypts the passwords, and decrypts them when needed.
  4. The operating system stores all passwords in a protected segment of non-volatile memory.

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts