Ujian Certified Ethical Hacker (CEH) – Chapter 3 Cryptography

Certified Ethical Hacker (CEH) adalah seorang profesional terampil yang memahami dan mengetahui cara mencari kelemahan dan kerentanan dalam sistem target dan menggunakan pengetahuan dan tool yang sama seperti peretas jahat, tetapi dengan cara yang sah dan sah untuk menilai postur keamanan sistem target. Kredensial CEH mensertifikasi individu dalam disiplin keamanan jaringan khusus Peretasan Etis dari perspektif netral vendor.

Tentang Ujian –

Jumlah Pertanyaan: Hanya 125
Durasi Ujian: 4 Jam
Format Tes: Pertanyaan Pilihan Ganda
Pengiriman Tes: UJIAN ECC, VUE
Awalan Ujian: 312-50 (UJIAN ECC), 312-50 (VUE)

  1. Symmetric cryptography is also known as __.
    A) Shared key cryptography
    B) Public key cryptography
    C) Hashing
    D) Steganography
  2. Which of the following manages digital certificates?
    A) Hub
    B) Key
    C) Public key
    D) Certificate authority
  3. Asymmetric encryption is also referred to as which of the following?
    A) Shared key
    B) Public key
    C) Hashing
    D) Block
  4. Which of the following best describes hashing?
    A) An algorithm
    B) A cipher
    C) Nonreversible
    D) A cryptosystem
  5. A message digest is a product of which kind of algorithm?
    A) Symmetric
    B) Asymmetric
    C) Hashing
    D) Steganography
  6. A public and private key system differs from symmetric because it uses which of the following?
    A) One key
    B) One algorithm
    C) Two keys
    D) Two algorithms
  7. A public key is stored on the local computer by its owner in a __.
    A) Hash
    B) PKI system
    C) Smart card
    D) Private key
  8. Symmetric key systems have key distribution problems due to __.
    A) Number of keys
    B) Generation of key pairs
    C) Amount of data
    D) Type of data
  9. What does hashing preserve in relation to data?
    A) Integrity
    B) Confidentiality
    C) Availability
    D) Repudiation
  10. Which of the following is a common hashing protocol?
    A) MD5
    B) AES
    C) DES
    D) RSA
  11. Which of the following best describes PGP?
    A) A symmetric algorithm
    B) A type of key
    C) A way of encrypting data in a reversible method
    D) A key escrow system
  12. SSL is a mechanism for which of the following?
    A) Securing stored data
    B) Securing transmitted data
    C) Verifying data
    D) Authenticating data
  13. Which system does SSL use to function?
    A) AES
    B) DES
    C) 3DES
    D) PKI
  14. In IPsec, encryption and other processes happen at which layer of the OSI model?
    A) Level 1
    B) Level 2
    C) Level 3
    D) Level 4
  15. In IPsec, what does Authentication Header (AH) provide?
    A) Data security
    B) Header security
    C) Authentication services
    D) Encryption
  16. In IPsec, what does Encapsulating Security Payload (ESP) provide?
    A) Data security
    B) Header security
    C) Authentication services
    D) Integrity
  17. At what point can SSL be used to protect data?
    A) On a hard drive
    B) On a flash drive
    C) On Bluetooth
    D) During transmission
  18. Which of the following does IPsec use?
    A) SSL
    B) AES
    C) DES
    D) PKI
  19. Who first developed SSL?
    A) Netscape
    B) Microsoft
    C) Sun
    D) Oracle
  20. IPsec uses which two modes?
    A) AH/ESP
    B) AES/DES
    C) EH/ASP
    D) AES/ESP
Jawaban :
  1. 1. A) Shared key cryptography
  2. 2. D) Certificate authority
  3. 3. B) Public key
  4. 4. A) An algorithm
  5. 5. C) Hashing
  6. 6. C) Two keys
  7. 7. C) Smart card
  8. 8. A) Number of keys
  9. 9. A) Integrity
  10. 10. A) MD5
  11. 11. B) A type of key
  12. 12. B) Securing transmitted data
  13. 13. D) PKI
  14. 14. C) Level 3
  15. 15. B) Header security
  16. 16. A) Data security
  17. 17. D) During transmission
  18. 18. D) PKI
  19. 19. A) Netscape
  20. 20. A) AH/ESP

Leave a ReplyCancel reply