Free CEH-001 Exam Braindumps (page: 94)

Page 93 of 220

When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

  1. A bottom-up approach
  2. A top-down approach
  3. A senior creation approach
  4. An IT assurance approach

Answer(s): B



Which element of Public Key Infrastructure (PKI) verifies the applicant?

  1. Certificate authority
  2. Validation authority
  3. Registration authority
  4. Verification authority

Answer(s): C



Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?

  1. WebBugs
  2. WebGoat
  3. VULN_HTML
  4. WebScarab

Answer(s): B



A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?

  1. Locate type=ns
  2. Request type=ns
  3. Set type=ns
  4. Transfer type=ns

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts