Certified Ethical Hacker – CEH – 312-50 – Question174

What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?


A.
Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient communication.
B. To get messaging programs to function with this algorithm requires complex configurations.
C. It has been proven to be a weak cipher; therefore, should not be trusted to protect sensitive data.
D. It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question172

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?


A.
Multiple keys for non-repudiation of bulk data
B. Different keys on both ends of the transport medium
C. Bulk encryption for data transmission over fiber
D. The same key on each end of the transmission medium

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question166

What is the main disadvantage of the scripting languages as opposed to compiled programming languages?


A.
Scripting languages are hard to learn.
B. Scripting languages are not object-oriented.
C. Scripting languages cannot be used to create graphical user interfaces.
D. Scripting languages are slower because they require an interpreter to run the code.

Correct Answer: D