Handsome Savings - Limited Time Offer 30% OFF - Ends In 0d 0h 0m 0s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

GAQM CPEH-001 Exam Actual Questions

The questions for CPEH-001 were last updated on Oct 3, 2024.
  • Viewing page 1 out of 175 pages.
  • Viewing questions 1-5 out of 877 questions
Unlock Access to All 877 Questions & Answers
Question No. 1

Which of the following best describes session key creation in SSL?

Show Answer Hide Answer
Correct Answer: D

An SSL session always begins with an exchange of messages called the SSL handshake. The handshake allows the server to authenticate itself to the client using public-key techniques, then allows the client and the server to cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper detection during the session that follows. Optionally, the handshake also allows the client to authenticate itself to the server.


Question No. 2

How many bits encryption does SHA-1 use?

Show Answer Hide Answer
Correct Answer: C

SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of 264 - 1 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms.


Question No. 3

There is some dispute between two network administrators at your company. Your boss asks you to come and meet with the administrators to set the record straight. Which of these are true about PKI and encryption?

Select the best answers.

Show Answer Hide Answer
Correct Answer: B, D

PKI provides confidentiality, integrity, and authenticity of the messages exchanged between these two types of systems. The 3rd party provides the public key and the receiver verifies the message with a combination of the private and public key. Public-key encryption WAS invented in 1976 by Whitfield Diffie and Martin Hellman. The famous hashing algorithm Diffie-Hellman was named after them. The RSA Algorithm is created by the RSA Security company that also has created other widely used encryption algorithms.


Question No. 4

A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department. What kind of penetration test would you recommend that would best address the client's concern?

Show Answer Hide Answer
Correct Answer: C

Question No. 5

In which of the following should be performed first in any penetration test?

Show Answer Hide Answer
Correct Answer: C

Product Image

Unlock All Questions for GAQM CPEH-001 Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 877 Questions & Answers