CEH v11 Practice Test with Complete Solutions
How do AI and Machine Learning Enhance Security? - Answer-AI and Machine Learning help with:
Password protection and authentication
Phishing detection and prevention
Threat detection
Vulnerability Management
Behavioral analytics
Network security
...
CEH v11 Practice Test with
Complete Solutions
How do AI and Machine Learning Enhance Security? - Answer-AI and Machine
Learning help with:
Password protection and authentication
Phishing detection and prevention
Threat detection
Vulnerability Management
Behavioral analytics
Network security
AI-base AV
Fraud detection
Botnet detection
AI to combat AI threats
Information Obtained During Footprinting - Answer-Organization information
Network information
System information
Objectives of Footprinting - Answer-Know security posture
Reduce focus area
Identify vulnerabilities
Draw network map
Threats Made Possible through Footprinting - Answer-Social engineering
System and network attacks
Information leakage
Privacy loss
Corporate espionage
Business loss
Footprinting Techniques - Answer-Footprinting through search engines
Footprinting through web services
Footprinting through social networking sites
Website footprinting
Email footprinting
Competitive intelligence Whois footprinting
DNS footprinting
Network footprinting
, Footprinting through social engineering
Google Advanced Search Operators - Answer-Operators [with examples]:
site:[www.quizlet.com]
allinurl:[term in url]
inurl:[term site:www.quizlet.com]
allintitle:[term1 term2]
in title:[term]
inanchor:[term in image anchor text on webpage]
cache:[website url that you want to view the cached version of]
link:[website with link to their page in another site to view sites with those links]
related:[www.quizlet.com]
info:[www.quizlet.com]
location:[San Francisco, CA]
filetype:[.jpg]
Tools to Search Sub-domains - Answer-Netcraft (GUI app)
Pentest Tools Find Subdomain (online tool with webpage)
Tools for Footprinting through Web Services - Answer-Google Earth: target locations
Social networking sites
theHarvester: scrapes Linkedin, search engines
Google Finance: financial services
Job sites
Tor deep- and dark-web
Netcraft: determine the OS
Shodan: find IoT devices and Vulnerabilities, VPNs and VoIP
Censys: discovers unknown assets on the internet and their details
Competitive Intelligence - Answer-From direct and indirect sources
Answers:
When did it begin?
How did it develop?
Who leads it?
Where is it located?
Competitive Intelligence Resource Sites - Answer-- EDGAR (Electronic Data Gathering,
Analysis, and Retrieval) Database: Automatically collects submissions to the USSEC
- D&B Hoovers: Commercial database of of business records for sales and marketing
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.