Question 91

- (Topic 8)
Which is the Novell Netware Packet signature level used to sign all packets ?

Correct Answer:D
Level 0 is no signature, Level 3 is communication using signature only.

Question 92

- (Topic 4)
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

Correct Answer:C

Question 93

- (Topic 4)
What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?

Correct Answer:B

Question 94

- (Topic 7)
A POP3 client contacts the POP3 server:

Correct Answer:B
POP is used to receive e-mail. SMTP is used to send e-mail.

Question 95

- (Topic 4)
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?

Correct Answer:D

Question 96

- (Topic 3)
June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?

Correct Answer:C

START CEH-001 EXAM