Free CEH-001 Exam Braindumps (page: 95)

Page 94 of 220

After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?

  1. SHA1
  2. Diffie-Helman
  3. RSA
  4. AES

Answer(s): A



To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?

  1. Recipient's private key
  2. Recipient's public key
  3. Master encryption key
  4. Sender's public key

Answer(s): B



An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

  1. By using SQL injection
  2. By changing hidden form values
  3. By using cross site scripting
  4. By utilizing a buffer overflow attack

Answer(s): B



Which of the following items is unique to the N-tier architecture method of designing software applications?

  1. Application layers can be separated, allowing each layer to be upgraded independently from other layers.
  2. It is compatible with various databases including Access, Oracle, and SQL.
  3. Data security is tied into each layer and must be updated for all layers when any upgrade is performed.
  4. Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts