Exam (elaborations)
Certified Ethical Hacker CEH Exam Questions And Answers With Correct Solutions 2024
Course
Certified Ethical Hacker CEH
Institution
Certified Ethical Hacker CEH
Certified Ethical Hacker CEH Exam Questions And Answers With Correct Solutions 2024
[Show more]
Preview 3 out of 20 pages
Uploaded on
September 20, 2024
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
Institution
Certified Ethical Hacker CEH
Course
Certified Ethical Hacker CEH
$15.49
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
Certified Ethical Hacker CEH Exam
Questions And Answers With Correct
Solutions 2024
Confidentiality .- .correct .answer.Ensures .the .secret .information .is .protected .from
.unauthorized .disclosure.
Integrity .- .correct .answer.Data .or .information .in .your .system .is .maintained .so .it .is .not
.modified .or .deleted .by .3rd .parties.
Availability .- .correct .answer.Systems .and .data .are .available .to .users .no .matter .what
.circumstances, .like .a .power .outage .or .natural .disaster.
Authenticity .- .correct .answer.Assurance .that .the .message, .transaction, .or .other
.exchange .of .information, .is .from .the .source.
Non-repudiation .- .correct .answer.Assurance .that .the .sender .of .information .is .provided
.with .proof .of .delivery .and .the .recipient .is .provided .with .proof .of .sender's .identity. .This .is
.so .neither .can .later .deny .having .processed .the .information.
Identification .- .correct .answer.The .ability .to .uniquely .identify .a .user .or .an .application .that
.is .running .in .the .system.
Authentication .- .correct .answer.Who .wants .access .to .the .network?
Authorization .- .correct .answer.What .is .the .user .allowed .to .access?
Accounting .- .correct .answer.What .did .the .user .do .in .the .network?
Abend .- .correct .answer.An .unexpected .or .abnormal .termination .of .an .application .or
.operating .system .that .results .from .a .problem .with .the .software.
Clone-in .Attacks .- .correct .answer.Someone .who .attempts .to .enter .a .device, .data, .or
.systems .in .a .physical .manner.
,Distribution .Attacks .- .correct .answer.A .malicious .attack .on .a .network .resource .that
.prevents .legitimate .users .from .accessing .the .resource. .This .is .typically .initiating .an
.overwhelming .number .of .spurious .requests .for .service.
Defensive .Warfare .- .correct .answer.Deploys .a .proactive .approach .to .security .through .the
.use .of .ethical .hacking.
Offensive .Warfare .- .correct .answer.Uses .a .reactive .approach .to .security .that .focuses .on
.detection, .prevention, .and .response .to .attacks.
Cyber .Kill .Chain .- .correct .answer.Outlines .the .various .stages .of .several .common
.cyberattacks. .By .extension .these .are .also .points .at .which .the .information .security .team
.can .detect, .prevent, .and .intercept .attacks. .These .points .consist .of:
1) .Reconnaissance
2) .Weaponization
3) .Delivery
4) .Exploitation
5) .Installation
6) .Command .& .Control
7) .Action .on .Objective
Black .Hat .Hacker .- .correct .answer.An .individual .who .breaks .into .computer .networks .with
.malicious .intent.
White .Hat .Hacker .- .correct .answer.An .individual .who .uses .hacking .skills .to .identify
.security .vulnerabilities .in .hardware, .software, .or .networks.
Gray .Hat .Hacker .- .correct .answer.An .individual .who .may .sometimes .violate .laws .or
.typical .ethical .standards, .but .usually .does .not .have .the .malicious .intent .typical .of .a .black
.hat .hacker
Black-Box .Testing .- .correct .answer.A .method .of .software .testing .that .examines .the
.functionality .of .an .application .without .peering .into .its .internal .structures .or .workings.
White-Box .Testing .- .correct .answer.A .method .of .software .testing .where .the .hacker .has
.full .knowledge .of .the .system .being .attacked.
Gray-Box .Testing .- .correct .answer.A .method .of .software .testing .where .it .uses .a
.combination .of .white-box .testing .and .black-box .testing.
Hacktivist .Hacker .- .correct .answer.Using .hacking .as .a .form .of .civil .disobedience .to
.promote .a .political .agenda .or .social .change.
Suicide .Hacker .- .correct .answer.Ready .and .willing .to .perform .an .attack .for .a ."cause",
.even .if .they .get .caught .and .prosecuted.
, Hack .Value .- .correct .answer.The .notion .used .by .hackers .to .express .that .something .is
.worth .doing .or .interesting.
Passive .Reconnaissance .- .correct .answer.An .attempt .to .gain .information .about .targeted
.computers .and .networks .without .actively .engaging .with .the .system.
Active .Reconnaissance .- .correct .answer.A .type .of .computer .attack .in .which .an .intruder
.engages .with .the .targeted .system .to .gather .information .about .vulnerabilities.
Information .Assurance .- .correct .answer.Managing .risks .related .to .the .use, .processing,
.storage, .and .transmission .of .information.
Defense .in .Depth .- .correct .answer.Concept .used .in .information .security .in .which .multiple
.layers .of .security .controls .are .placed .throughout .an .information .technology .system.
Threat .- .correct .answer.Exploits .a .vulnerability .and .can .damage .or .destroy .an .asset.
Risk .- .correct .answer.Refers .to .the .potential .for .lost, .damaged, .or .destroyed .assets
Vulnerability .- .correct .answer.A .weakness .in .your .hardware, .software, .or .procedures
Cyber .Threat .Intelligence .- .correct .answer.The .knowledge, .skills, .and .experience-based
.information .concerning .the .occurrence .and .assessment .of .both .cyber .and .physical
.threats .and .threat .actors. .This .information .is .intended .to .help .mitigate .potential .attacks
.and .harmful .events .occurring .in .cyberspace.
Competitive .Intellegence .- .correct .answer.The .process .that .involves .gathering,
.analyzing, .and .distribution .of .information .about .products, .customers, .competitors, .and
.technologies .using .the .internet.
Threat .Modeling .- .correct .answer.A .structured .process .with .the .following .objectives:
- .Identify .security .requirements
- .Pinpoint .security .threats .and .potential .vulnerabilities
- .Quantify .threat .and .vulnerability .critically
- .Prioritize .remediation .methods
Deep .Web .- .correct .answer.Sites .and .services .that .are .not .indexed .by .search .engines
Dark .Web .- .correct .answer.World .wide .web .content .that .exists .on .darknets: .overlay
.networks .that .use .the .Internet .but .require .specific .software, .configurations, .or
.authorization .to .access.
Eavesdropping .- .correct .answer.The .interception .of .communication .between .two .parties
.by .a .malicious .third .party.