PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

What does this principle refer to?

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob’s public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message. Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob’s public key and use it to verify
Bob’s signature, they cannot discover Bob’s private key and use it to forge digital signatures. What does this principle refer to?

If we combine the strength of both crypto systems where we use the symmetric algorithm to encrypt the bulk of

Symmetric encryption algorithms are known to be fast but present great challenges on the key management side. Asymmetric encryption algorithms are slow but allow communication with a remote host without having to transfer a key out of band or in person. If we combine the strength of both crypto systems where we use the symmetric algorithm to encrypt the bulk of the data and then use the asymmetric encryption system to encrypt the symmetric key, what would this type of usage be known as?

What kind of attack is this program susceptible to?

The programmers on your team are analyzing the free, open source software being used to run FTP services on a server. They notice that there is an excessive number of fgets() and gets() on the source code. These C++ functions do not check bounds. What kind of attack is this program susceptible to?

Which of these describes a low interaction honeypot?

There are two types of honeypots- high and low interaction. Which of these describes a low interaction honeypot? Select the best answers.

Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing att

Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?


Page 14 of 125« First...1213141516...203040...Last »