Certified Ethical Hacker (CEH) adalah seorang profesional terampil yang memahami dan mengetahui cara mencari kelemahan dan kerentanan dalam sistem target dan menggunakan pengetahuan dan tool yang sama seperti peretas jahat, tetapi dengan cara yang sah dan sah untuk menilai postur keamanan sistem target. Kredensial CEH mensertifikasi individu dalam disiplin keamanan jaringan khusus Peretasan Etis dari perspektif netral vendor.
Tentang Ujian –
Jumlah Pertanyaan: Hanya 125
Durasi Ujian: 4 Jam
Format Tes: Pertanyaan Pilihan Ganda
Pengiriman Tes: UJIAN ECC, VUE
Awalan Ujian: 312-50 (UJIAN ECC), 312-50 (VUE)
- Symmetric cryptography is also known as __.
A) Shared key cryptography
B) Public key cryptography
C) Hashing
D) Steganography - Which of the following manages digital certificates?
A) Hub
B) Key
C) Public key
D) Certificate authority - Asymmetric encryption is also referred to as which of the following?
A) Shared key
B) Public key
C) Hashing
D) Block - Which of the following best describes hashing?
A) An algorithm
B) A cipher
C) Nonreversible
D) A cryptosystem - A message digest is a product of which kind of algorithm?
A) Symmetric
B) Asymmetric
C) Hashing
D) Steganography - A public and private key system differs from symmetric because it uses which of the following?
A) One key
B) One algorithm
C) Two keys
D) Two algorithms - A public key is stored on the local computer by its owner in a __.
A) Hash
B) PKI system
C) Smart card
D) Private key - Symmetric key systems have key distribution problems due to __.
A) Number of keys
B) Generation of key pairs
C) Amount of data
D) Type of data - What does hashing preserve in relation to data?
A) Integrity
B) Confidentiality
C) Availability
D) Repudiation - Which of the following is a common hashing protocol?
A) MD5
B) AES
C) DES
D) RSA - Which of the following best describes PGP?
A) A symmetric algorithm
B) A type of key
C) A way of encrypting data in a reversible method
D) A key escrow system - SSL is a mechanism for which of the following?
A) Securing stored data
B) Securing transmitted data
C) Verifying data
D) Authenticating data - Which system does SSL use to function?
A) AES
B) DES
C) 3DES
D) PKI - In IPsec, encryption and other processes happen at which layer of the OSI model?
A) Level 1
B) Level 2
C) Level 3
D) Level 4 - In IPsec, what does Authentication Header (AH) provide?
A) Data security
B) Header security
C) Authentication services
D) Encryption - In IPsec, what does Encapsulating Security Payload (ESP) provide?
A) Data security
B) Header security
C) Authentication services
D) Integrity - At what point can SSL be used to protect data?
A) On a hard drive
B) On a flash drive
C) On Bluetooth
D) During transmission - Which of the following does IPsec use?
A) SSL
B) AES
C) DES
D) PKI - Who first developed SSL?
A) Netscape
B) Microsoft
C) Sun
D) Oracle - IPsec uses which two modes?
A) AH/ESP
B) AES/DES
C) EH/ASP
D) AES/ESP
Jawaban :
- 1. A) Shared key cryptography
- 2. D) Certificate authority
- 3. B) Public key
- 4. A) An algorithm
- 5. C) Hashing
- 6. C) Two keys
- 7. C) Smart card
- 8. A) Number of keys
- 9. A) Integrity
- 10. A) MD5
- 11. B) A type of key
- 12. B) Securing transmitted data
- 13. D) PKI
- 14. C) Level 3
- 15. B) Header security
- 16. A) Data security
- 17. D) During transmission
- 18. D) PKI
- 19. A) Netscape
- 20. A) AH/ESP