Block Cipher Mode of Operation Correct Ans-an algorithm that uses a block cipher to
provide information security such as confidentiality or authenticity.
Electronic code book mode Correct Ans-The simplest (and not to be used anymore) of the
encryption modes (named after conventional physical codebooks). The message is divided
into blocks, and each block is encrypted separately.
BlueBorne Correct Ans-is a type of security vulnerability with Bluetooth implementations
in Android, iOS, Linux and Windows. It affects many electronic devices such as laptops, smart
cars, smartphones and wearable gadgets.
Bluto Correct Ans-is a Python-based tool for DNS recon, DNS zone transfer testing, DNS
wild card checks, DNS brute forcing, e-mail enumeration and more.
, CEH v12 Exam with Complete Solutions
Brute Force Attack Correct Ans-consists of an attacker submitting many passwords or
passphrases with the hope of eventually guessing correctly.
Buffer Overflow Correct Ans-is an anomaly whereby a program, while writing data to a
buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
Burp Suite Correct Ans-is an integrated platform/graphical tool for performing security
testing of web applications.
Carrier Cloud Correct Ans-is a class of cloud that integrates wide area networks (WAN) and
other attributes of communications service providers' carrier grade networks to enable the
deployment of highly complex applications in the cloud.
Chosen Plaintext Attack (CPA) Correct Ans-is an attack model for cryptanalysis which
presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts. The goal of the
attack is to gain information that reduces the security of the encryption scheme.
, CEH v12 Exam with Complete Solutions
ALTEr Attack Correct Ans-an attacker pretends to be a real cell tower to the victim, while at
the same time also pretending to be the victim to the real network, and then intercepts the
communications between the victim and the real network.
Android Package Kit Correct Ans-with the file extension apk is the file format used by the
Android operating system, and a number of other Android-based operating systems for
distribution and installation of mobile apps, mobile games and middleware. It can be written
in either Java or Kotlin.
Archive Org Correct Ans-is an American digital library with the stated mission of "universal
access to all knowledge".
Armitage Correct Ans-is a graphical cyber attack management tool for the Metasploit
Project that visualizes targets and recommends exploits. It is a free and open source network
, CEH v12 Exam with Complete Solutions
security tool notable for its contributions to red team collaboration allowing for: shared
sessions, data, and communication through a single Metasploit instance.
Auth0 Correct Ans-Rapidly integrate authentication and authorization for web, mobile,
and legacy applications so you can focus on your core business.
BeEF Correct Ans-is short for The Browser Exploitation Framework. It is a penetration
testing tool that focuses on the web browser.
Birthday Attack Correct Ans-This attack can be used to abuse communication between two
or more parties. The attack depends on the higher likelihood of collisions found between
random attack attempts and a fixed degree of permutations (pigeonholes).
Block Chain Correct Ans-is a type of distributed ledger technology (DLT) that consists of
growing list of records, called blocks, that are securely linked together using cryptography.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.