Free CEH-001 Exam Braindumps (page: 88)

Page 87 of 220

Which of the following is an application that requires a host application for replication?

  1. Micro
  2. Worm
  3. Trojan
  4. Virus

Answer(s): D



Which of the following is a characteristic of Public Key Infrastructure (PKI)?

  1. Public-key cryptosystems are faster than symmetric-key cryptosystems.
  2. Public-key cryptosystems distribute public-keys within digital signatures.
  3. Public-key cryptosystems do not require a secure key distribution channel.
  4. Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

Answer(s): B



What statement is true regarding LM hashes?

  1. LM hashes consist in 48 hexadecimal characters.
  2. LM hashes are based on AES128 cryptographic standard.
  3. Uppercase characters in the password are converted to lowercase.
  4. LM hashes are not generated when the password length exceeds 15 characters.

Answer(s): D



What is a successful method for protecting a router from potential smurf attacks?

  1. Placing the router in broadcast mode
  2. Enabling port forwarding on the router
  3. Installing the router outside of the network's firewall
  4. Disabling the router from accepting broadcast ping messages

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts