GAQM CPEH-001 - Certified Professional Ethical Hacker (CPEH)
Which statement best describes a server type under an N-tier architecture?
Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?
An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?
Which of the following is optimized for confidential communications, such as bidirectional voice and video?
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
In the OSI model, where does PPTP encryption take place?
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
Which of the following guidelines or standards is associated with the credit card industry?
Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?
A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?
To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?