100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Certified Ethical Hacker (CEH) v12 with complete verified solutions 2024

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
08-02-2024
Written in
2023/2024

TCP 143 IMAP Port TCP 443 HTTPS Port Brainpower Read More UDP 123 NTP Port TCP 389, 636 LDAP Ports TCP 110 POP3 Port UDP 69 TFTP Port SLE x EF x ARO = ALE Quantitative Risk Analysis Formula. Risk = Likelihood x Impact Qualitative Risk Analysis Formula. Residual Risk The remaining risk after analysis and controls are put in place. whisker A popular tool used for session splicing. Boot Sector Virus A virus type that moves the Master Boot Record (MBR) to another location on the hard disk and copies itself to the original location of the MBR. Macro Virus A virus type that targets Microsoft Office programs. Metric A standard of measurement that is recorded over time to show improvement. Open Source Intelligence (OSINT) A type of passive reconnaissance that collects information from publicly available sources. salt A random string added to a password to defeat rainbow tables. TCP 25 The open port used by an email relay for spam and phishing attacks. TCP 9100 The most common network printer port black box A penetration test type in which the tester has no prior knowledge of the internal systems. detective control A control type that discovers events after they happen. social engineering A hacking technique used on people to determine if they need more training. hashing A one-way encryption that is used to see if files have maintained their integrity. WHOIS A system that consists of a publicly available set of databases that contain domain name registration and contact information. netcat 80 The simplest netcat command for grabbing the banner from preventive control The type of control that seeks to disallow an attack from happening in the first place. administrative control The type of control that must be enforced through policing by management. least privilege A security concept that requires a user be granted just enough permissions to do their job. technical or logical control A type of control that can be implemented through software. stateful The type of firewall that tracks whole connections, from start to finish. circuit-level The type of firewall that only monitors TCP handshaking. symmetric An encryption type that uses the same key to encrypt and decrypt. dictionary A password cracking method in which an automated tool tests a list of popular passwords in the hopes that one of them is correct. Tailgating A type of social engineering in which the attacker follows behind an employee to get into a restricted area. Retina scan A type of biometric scan that is used to measure blood vessels at the back of the eye. Blind SQL Injection The type of SQL injection used when you cannot depend on errors to tell you if your attack is working or not. Packet filtering The type of firewall that inspects each packet individually, with no memory of previous packets. asymmetric An encryption type in which one key encrypts, and its "partner" decrypts. rubber hose attack The use of force or coercion to extract information from a person. Encrypt the hard drive The recommended way to mitigate data theft from a laptop that a user travels with. covert channel A type of communication channel within an operating system that is neither designed nor intended to transfer information. zero day A newly discovered flaw in a software application that has no patch. Alice's public key The asymmetric key that Bob must use to send Alice a message only she can read. application-level firewall The type of firewall that can filter specific commands such as http:post. -A, -sV The two nmap switches that perform service detection and fingerprinting. -O The nmap switch that performs OS detection. UDP 514 The port that syslog uses. Sniffer, Packet Logger, NIDS The three Snort modes. C, C++ The two programming languages that are most vulnerable to buffer overflow attacks. SHA-1 A popular hashing algorithm that produces 160-bit output. Lan Manager (LM) Hash A password hashing algorithm in which all passwords are exactly 14 characters long. SQL injection A web app attack type that uses commands such as "SELECT * FROM USERS WHERE username = '$user' AND password = '$pass'"; honeypot A solution that emulates computer services in order to distract a hacker or obtain information about their activities. -Pn The nmap switch that will scan a host without first trying to ping it. -sn The nmap switch that only attempts to perform host discovery. Cloud Hopping An attack against a Managed Service Provider's (MSP) infrastructure to gain access to other tenants' sensitive data.

Show more Read less
Institution
Certified Ethical Hacker V12
Course
Certified Ethical Hacker v12









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Certified Ethical Hacker v12
Course
Certified Ethical Hacker v12

Document information

Uploaded on
February 8, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSUCCESS Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
662
Member since
3 year
Number of followers
314
Documents
24889
Last sold
4 days ago
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Read more Read less
4.3

250 reviews

5
162
4
37
3
33
2
12
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions