100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Certified Ethical Hacker (CEH) v12 with complete verified solutions 2024

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
08-02-2024
Geschreven in
2023/2024

TCP 143 IMAP Port TCP 443 HTTPS Port Brainpower Read More UDP 123 NTP Port TCP 389, 636 LDAP Ports TCP 110 POP3 Port UDP 69 TFTP Port SLE x EF x ARO = ALE Quantitative Risk Analysis Formula. Risk = Likelihood x Impact Qualitative Risk Analysis Formula. Residual Risk The remaining risk after analysis and controls are put in place. whisker A popular tool used for session splicing. Boot Sector Virus A virus type that moves the Master Boot Record (MBR) to another location on the hard disk and copies itself to the original location of the MBR. Macro Virus A virus type that targets Microsoft Office programs. Metric A standard of measurement that is recorded over time to show improvement. Open Source Intelligence (OSINT) A type of passive reconnaissance that collects information from publicly available sources. salt A random string added to a password to defeat rainbow tables. TCP 25 The open port used by an email relay for spam and phishing attacks. TCP 9100 The most common network printer port black box A penetration test type in which the tester has no prior knowledge of the internal systems. detective control A control type that discovers events after they happen. social engineering A hacking technique used on people to determine if they need more training. hashing A one-way encryption that is used to see if files have maintained their integrity. WHOIS A system that consists of a publicly available set of databases that contain domain name registration and contact information. netcat 80 The simplest netcat command for grabbing the banner from preventive control The type of control that seeks to disallow an attack from happening in the first place. administrative control The type of control that must be enforced through policing by management. least privilege A security concept that requires a user be granted just enough permissions to do their job. technical or logical control A type of control that can be implemented through software. stateful The type of firewall that tracks whole connections, from start to finish. circuit-level The type of firewall that only monitors TCP handshaking. symmetric An encryption type that uses the same key to encrypt and decrypt. dictionary A password cracking method in which an automated tool tests a list of popular passwords in the hopes that one of them is correct. Tailgating A type of social engineering in which the attacker follows behind an employee to get into a restricted area. Retina scan A type of biometric scan that is used to measure blood vessels at the back of the eye. Blind SQL Injection The type of SQL injection used when you cannot depend on errors to tell you if your attack is working or not. Packet filtering The type of firewall that inspects each packet individually, with no memory of previous packets. asymmetric An encryption type in which one key encrypts, and its "partner" decrypts. rubber hose attack The use of force or coercion to extract information from a person. Encrypt the hard drive The recommended way to mitigate data theft from a laptop that a user travels with. covert channel A type of communication channel within an operating system that is neither designed nor intended to transfer information. zero day A newly discovered flaw in a software application that has no patch. Alice's public key The asymmetric key that Bob must use to send Alice a message only she can read. application-level firewall The type of firewall that can filter specific commands such as http:post. -A, -sV The two nmap switches that perform service detection and fingerprinting. -O The nmap switch that performs OS detection. UDP 514 The port that syslog uses. Sniffer, Packet Logger, NIDS The three Snort modes. C, C++ The two programming languages that are most vulnerable to buffer overflow attacks. SHA-1 A popular hashing algorithm that produces 160-bit output. Lan Manager (LM) Hash A password hashing algorithm in which all passwords are exactly 14 characters long. SQL injection A web app attack type that uses commands such as "SELECT * FROM USERS WHERE username = '$user' AND password = '$pass'"; honeypot A solution that emulates computer services in order to distract a hacker or obtain information about their activities. -Pn The nmap switch that will scan a host without first trying to ping it. -sn The nmap switch that only attempts to perform host discovery. Cloud Hopping An attack against a Managed Service Provider's (MSP) infrastructure to gain access to other tenants' sensitive data.

Meer zien Lees minder
Instelling
Certified Ethical Hacker V12
Vak
Certified Ethical Hacker v12









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Certified Ethical Hacker v12
Vak
Certified Ethical Hacker v12

Documentinformatie

Geüpload op
8 februari 2024
Aantal pagina's
6
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GUARANTEEDSUCCESS Chamberlain College Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
662
Lid sinds
3 jaar
Aantal volgers
314
Documenten
24889
Laatst verkocht
4 dagen geleden
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Lees meer Lees minder
4.3

250 beoordelingen

5
162
4
37
3
33
2
12
1
6

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen