CEH-001 Dumps

CEH-001 Free Practice Test

GAQM CEH-001: Certified Ethical Hacker (CEH)

QUESTION 16

- (Topic 7)
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)

Correct Answer: C
In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or \'message\') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.

QUESTION 17

- (Topic 8)
To scan a host downstream from a security gateway, Firewalking:

Correct Answer: B
Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.

QUESTION 18

- (Topic 8)
Melissa is a virus that attacks Microsoft Windows platforms. To which category does this virus belong?

Correct Answer: D
The Melissa macro virus propagates in the form of an email message containing an infected Word document as an attachment.

QUESTION 19

- (Topic 3)
What is the main disadvantage of the scripting languages as opposed to compiled programming languages?

Correct Answer: D

QUESTION 20

- (Topic 3)
Which of the following statements are true regarding N-tier architecture? (Choose two.)

Correct Answer: AC