02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

418 Appendix A ■ Answers to Review Questions<br />

14. D. A true mesh topology creates a natural amount of redundancy due to the number of connections<br />

used to establish connectivity.<br />

15. C. Because each switchport is its own collision domain, only nodes that reside on the same<br />

switchport will be seen during a scan.<br />

16. D. Proxies act as intermediaries between internal host computers and the outside world.<br />

17. D. Network Address Translation (NAT) is a technology that funnels all internal traffic<br />

through a single public connection. NAT is implemented for both cost savings and network<br />

security.<br />

18. C. Intrusion prevention systems (IPSs) play an active role in preventing further suspicious<br />

activity after it is detected.<br />

19. D. Simple Mail Transfer Protocol (SMTP) operates on port 25 and is used for outgoing mail<br />

traffic. In this scenario, the IDS SMTP configuration needs to be updated.<br />

20. D. Packet filtering firewalls operate at layer 7 of the OSI model and thus filter traffic at a<br />

highly granular level.<br />

Chapter 3: Cryptography<br />

1. A. Symmetric cryptography is also known as shared key cryptography.<br />

2. D. A certification authority is responsible for issuing and managing digital certificates as<br />

well as keys.<br />

3. B. Asymmetric encryption uses two separate keys and is referred to as public key cryptography.<br />

Symmetric algorithms use only one key that is used by both the sender and receiver.<br />

4. C. Hashing is referred to as a cipher or algorithm or even a cryptosystem, but it can be<br />

uniquely referred to as a nonreversible mechanism for verifying the integrity of data.<br />

Remember that hashing doesn’t enforce confidentiality.<br />

5. C. A message digest is a product of a hashing algorithm, which may also be called a message<br />

digest function.<br />

6. C. A public and private key are mathematically related keys, but they are not identical. In<br />

symmetric systems only one key is used at a time.<br />

7. B. A public key is not necessarily stored on the local system, but a private key will always<br />

be present if the user is enrolled.<br />

8. A. The number of keys increases dramatically with more and more parties using symmetric<br />

encryption hence it does not scale well.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!