Certified Ethical Hacker (CEH) Practice Question

During a web penetration test you capture full packets from an HTTPS session that was negotiated with TLS 1.2. Two days later you obtain the target server's private RSA key from an old backup and want to decrypt the recorded traffic offline. Under which circumstance will this attempt actually succeed?

  • The handshake used ECDHE key exchange providing perfect forward secrecy.

  • The server's certificate chain included an intermediate signed with SHA-1.

  • The negotiated cipher employed AES-256-GCM for bulk encryption.

  • The handshake used a static RSA key exchange without any ephemeral Diffie-Hellman parameters.

Certified Ethical Hacker (CEH)
Cryptography
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot