Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following is something that happens that is detectable and this could be anything, such as a user logging in or a network connection failing?
Correct
An event can be explained as follows:-
(A) It is something when happens, that is detectable
(B) This could be anything, such as a user logging in or a network connection fails
(C) An incident is usually defined by an organization based on its own requirements, but generally, it’s an event that violates policy.
(D) This could be unauthorized use of a system, for instance.Incorrect
An event can be explained as follows:-
(A) It is something when happens, that is detectable
(B) This could be anything, such as a user logging in or a network connection fails
(C) An incident is usually defined by an organization based on its own requirements, but generally, it’s an event that violates policy.
(D) This could be unauthorized use of a system, for instance. -
Question 2 of 10
2. Question
Which of the following is a method of securely exchanging cryptographic keys over a public channel?
Correct
Diffie–Hellman key exchange is a method in which securely exchanging cryptographic keys or encryption keys over a public channel and was categorized as one of the first public-key protocols as proposed by Ralph Merkle. It was named after Whitfield Diffie and Martin Hellman.
Incorrect
Diffie–Hellman key exchange is a method in which securely exchanging cryptographic keys or encryption keys over a public channel and was categorized as one of the first public-key protocols as proposed by Ralph Merkle. It was named after Whitfield Diffie and Martin Hellman.
-
Question 3 of 10
3. Question
The Data Encryption Standard (DES) is a block cipher uses which of the following key algorithm?
Correct
The Data Encryption Standard (DES) can be explained as follows:-
(A) It is a block cypher that uses symmetric key
(B) This is a long-deprecated encryption standard, but it raises an important element about cryptography
(C) One of the problems with DES is that it only uses a 56-bit key.Incorrect
The Data Encryption Standard (DES) can be explained as follows:-
(A) It is a block cypher that uses symmetric key
(B) This is a long-deprecated encryption standard, but it raises an important element about cryptography
(C) One of the problems with DES is that it only uses a 56-bit key. -
Question 4 of 10
4. Question
One of the problems with DES is that it only uses a 56-bit key. With Triple DES (3DES), there are three keys that revises the effective key length which of the following?
Correct
With Triple DES (3DES), there are three DES symmetric keys, which enhances the effective key length to 168 bits. However, it’s not a single 168-bit key. It’s three keys applied one at a time. One key is used to encrypt the message. The other key is specifically used to decrypt already received message.
Incorrect
With Triple DES (3DES), there are three DES symmetric keys, which enhances the effective key length to 168 bits. However, it’s not a single 168-bit key. It’s three keys applied one at a time. One key is used to encrypt the message. The other key is specifically used to decrypt already received message.
-
Question 5 of 10
5. Question
Which of the following is sometimes called public-key cryptography?
Correct
Symmetric key cryptography uses a single key for both encryption and decryption at both side i.e. transmitter and receiver side, whereas asymmetric key cryptography uses two keys for encryption and decryption. This is the basic reason for asymmetric key cryptography is sometimes known as public-key cryptography. One key is called the private key and the other one is the public key.
Incorrect
Symmetric key cryptography uses a single key for both encryption and decryption at both side i.e. transmitter and receiver side, whereas asymmetric key cryptography uses two keys for encryption and decryption. This is the basic reason for asymmetric key cryptography is sometimes known as public-key cryptography. One key is called the private key and the other one is the public key.
-
Question 6 of 10
6. Question
Which of the following cryptosystem combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem?
Correct
In cryptography, a hybrid cryptosystem is explained as follows:-
(A) A cryptosystem that unites the easiness of a public-key cryptosystem with the effectiveness and efficiency of a symmetric-key cryptosystem
(B) Public-key cryptosystems are more comfortable in that they do not require the transmitter and receiver to share a common secret to communicate safely and securelyIncorrect
In cryptography, a hybrid cryptosystem is explained as follows:-
(A) A cryptosystem that unites the easiness of a public-key cryptosystem with the effectiveness and efficiency of a symmetric-key cryptosystem
(B) Public-key cryptosystems are more comfortable in that they do not require the transmitter and receiver to share a common secret to communicate safely and securely -
Question 7 of 10
7. Question
In cryptography, which of the following is an entity that issues digital certificates?
Correct
In cryptography, a certificate authority or certification authority is an entity or body that issues or regularizes digital certificates. Furthermore, a digital certificate which is issued by this authority certifies the ownership of a public key by the named subject of the certificate.
Incorrect
In cryptography, a certificate authority or certification authority is an entity or body that issues or regularizes digital certificates. Furthermore, a digital certificate which is issued by this authority certifies the ownership of a public key by the named subject of the certificate.
-
Question 8 of 10
8. Question
Which of the following is the advantage of symmetric key encryption over asymmetric key encryption?
Correct
The main advantage or benefit of symmetric encryption with respect to asymmetric encryption is that it is very efficient and fast for large amounts of data. The main disadvantage of symmetric encryption is the need to keep the key secret. In other words, this can be very challenging where decryption and encryption take place in different areas or locations, requiring the encryption key to be moved.
Incorrect
The main advantage or benefit of symmetric encryption with respect to asymmetric encryption is that it is very efficient and fast for large amounts of data. The main disadvantage of symmetric encryption is the need to keep the key secret. In other words, this can be very challenging where decryption and encryption take place in different areas or locations, requiring the encryption key to be moved.
-
Question 9 of 10
9. Question
Regarding Governmental data classifications, It is the highest level of data classification and only a very limited number of people will be able to look at data is categorized which of the following?
Correct
The highest level of data classification, according to Governmental data classifications, is categorised as top secret. A very limited number of people are authorised to view or read information categorised as top-secret. Moreover, it is categorised as the highest level of classified information.
Incorrect
The highest level of data classification, according to Governmental data classifications, is categorised as top secret. A very limited number of people are authorised to view or read information categorised as top-secret. Moreover, it is categorised as the highest level of classified information.
-
Question 10 of 10
10. Question
Regarding Governmental data classifications, the exposure of information causing serious damage to national security is the definition for which of the following?
Correct
According to Governmental data classifications, the exposure or intentionally loss of secret information would cause grave concern and serious damage to national security. Access to secret data or information is restricted by law, rule or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the information or data can incur criminal penalties.
Incorrect
According to Governmental data classifications, the exposure or intentionally loss of secret information would cause grave concern and serious damage to national security. Access to secret data or information is restricted by law, rule or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the information or data can incur criminal penalties.