tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    51. Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?

    A. Use a scan tool like Nessus

    B. Check MITRE.org for the latest list of CVE findings

    C. Create a disk image of a clean Windows installation

    D. U. the built in Windows Update tool



    52. What is a "Collision attack" in cryptography?

    A. Collision attacks try to find two inputs producing the same hash.

    B. Collision attacks try to break the hash into three parts to get the plaintext value.

    C. Collision attacks try to get the public key.

    D. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key.



    < Prev.Page             CEHv9 Home             Next page>