GAQM Related Exams
CPEH-001 Exam
A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?
Which of the following tools would MOST LIKELY be used to perform security audit on various of forms of network systems?
In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?