Certified Ethical Hacker Practice Exam - Part V
Volume E
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down your contact number. *
Q401: What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on? *
1 point
Q402: Which of the following algorithms provides better protection against brute force attacks by using an a160-bit message digest? *
1 point
Q403: Company A and Company B have just merged and each has its own Public Key Infrastructure(PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company? *
1 point
Q404: What is the best defense against privilege escalation vulnerability? *
1 point
Q405: Fingerprinting VPN firewalls is possible with which of the following tools? *
1 point
Q406: A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration? *
1 point
Q407: Which of the following is a primary service of the U.S. Computer Security Incident Response Team(CSIRT)? *
1 point
Q408: Which of the following is a client-server tool utilized to evade firewall inspection? *
1 point
Q409: Which of the following is a symmetric cryptographic standard?   *
1 point
Q410: Which of the following cryptography attack methods is usually performed without the use of a computer? *
1 point
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy