Package deal
Certified Ethical Hacker Certification - CEH Bundle Set
Certified Ethical Hacker Certification - CEH Bundle Set
[Show more]Certified Ethical Hacker Certification - CEH Bundle Set
[Show more]ARP cache with forged entries. 
 
Grey box testing - Answer A combination of black box and white box testing that gives a full inspection of the system, simulating both outside and inside attacks 
 
NTP Enumeration - Answer NTP stands for Network Time Protocol and its role is to ensure that the ...
Preview 4 out of 49 pages
Add to cartARP cache with forged entries. 
 
Grey box testing - Answer A combination of black box and white box testing that gives a full inspection of the system, simulating both outside and inside attacks 
 
NTP Enumeration - Answer NTP stands for Network Time Protocol and its role is to ensure that the ...
Robert hopes to start a career in computer security. As a new college-level student, he has just learned the term ethical hacking, which is a key part of secure information systems. Of the below options, choose which will be key areas of expertise for Robert's future career. Answer is complete. Sel...
Preview 4 out of 39 pages
Add to cartRobert hopes to start a career in computer security. As a new college-level student, he has just learned the term ethical hacking, which is a key part of secure information systems. Of the below options, choose which will be key areas of expertise for Robert's future career. Answer is complete. Sel...
Confidentiality - Answer The measures taken to prevent disclosure of information or data to unauthorized individuals or systems. 
 
Integrity - Answer The methods and actions taken to protect the information from unauthorized alteration or revision - whether the data is at rest or in transit. 
 ...
Preview 3 out of 19 pages
Add to cartConfidentiality - Answer The measures taken to prevent disclosure of information or data to unauthorized individuals or systems. 
 
Integrity - Answer The methods and actions taken to protect the information from unauthorized alteration or revision - whether the data is at rest or in transit. 
 ...
Insider affiliate - Answer What threat type is a spouse, friend, or even client of an employee who uses the employee's credentials to gain access? 
 
161 and 162 - Answer Which port numbers are used for SNMP? 
 
22 - Answer Which port number is used for SSH? 
 
Network, software or service av...
Preview 4 out of 417 pages
Add to cartInsider affiliate - Answer What threat type is a spouse, friend, or even client of an employee who uses the employee's credentials to gain access? 
 
161 and 162 - Answer Which port numbers are used for SNMP? 
 
22 - Answer Which port number is used for SSH? 
 
Network, software or service av...
What does the TCP flag *SYN* indicate? - Answer SYN indicates synchronize number. 
 
What does the TCP flag *ACK* indicate? - Answer ACK indicates acknowledgement of the SYN sequence number. 
 
What does the TCP flag *FIN* indicate? - Answer FIN indicates the final data bit being sent for use ...
Preview 4 out of 90 pages
Add to cartWhat does the TCP flag *SYN* indicate? - Answer SYN indicates synchronize number. 
 
What does the TCP flag *ACK* indicate? - Answer ACK indicates acknowledgement of the SYN sequence number. 
 
What does the TCP flag *FIN* indicate? - Answer FIN indicates the final data bit being sent for use ...
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? - Answer A. WarChalking 
 
The act of altering configuration files and the expected operation of a service is known as what kind of attack? - Answer C. Service Reconfiguration 
 
ARP (Address Resoluti...
Preview 2 out of 8 pages
Add to cartDrawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? - Answer A. WarChalking 
 
The act of altering configuration files and the expected operation of a service is known as what kind of attack? - Answer C. Service Reconfiguration 
 
ARP (Address Resoluti...
A Certified Ethical Hacker follows a specific methodology for testing a system. Which step comes after footprinting in the CEH methodology? - Answer Scanning 
 
You've been hired as part of a pen test team. During the in brief, you learn the client wants the pen test attack to simulate a normal u...
Preview 3 out of 24 pages
Add to cartA Certified Ethical Hacker follows a specific methodology for testing a system. Which step comes after footprinting in the CEH methodology? - Answer Scanning 
 
You've been hired as part of a pen test team. During the in brief, you learn the client wants the pen test attack to simulate a normal u...
Which of the following countermeasure can specifically protect against both the MAC Flood and 
MAC Spoofing attacks? 
 
 
A. Configure Port Security on the switch 
B. Configure Port Recon on the switch 
C. Configure Switch Mapping 
D. Configure Multiple Recognition on the switch - Answer A. C...
Preview 4 out of 59 pages
Add to cartWhich of the following countermeasure can specifically protect against both the MAC Flood and 
MAC Spoofing attacks? 
 
 
A. Configure Port Security on the switch 
B. Configure Port Recon on the switch 
C. Configure Switch Mapping 
D. Configure Multiple Recognition on the switch - Answer A. C...
Threat - Answer Is an environment or situation that could lead to a potential breach of security. 
 
Exploit - Answer Is a piece of software that takes an advantage of a bug, glitch, or vulnerability, leading to an unauthorized access, privilege escalation, or denial of service on a computer sys...
Preview 2 out of 9 pages
Add to cartThreat - Answer Is an environment or situation that could lead to a potential breach of security. 
 
Exploit - Answer Is a piece of software that takes an advantage of a bug, glitch, or vulnerability, leading to an unauthorized access, privilege escalation, or denial of service on a computer sys...
An ethical hacker in a person who performs most of the same activities a hacker does, but with the owner or company's permission - Answer True 
 
A malicious computer program that replicates and propagates itself without having to attach a host is called which of the following? - Answer virus 
...
Preview 2 out of 8 pages
Add to cartAn ethical hacker in a person who performs most of the same activities a hacker does, but with the owner or company's permission - Answer True 
 
A malicious computer program that replicates and propagates itself without having to attach a host is called which of the following? - Answer virus 
...
Penetration-Testing Methodologies - Answer 1. Black Box 
2. White Box 
3. Gray Box 
 
Computer Fraud Abuse Act - Answer This law makes it a federal crime to access classified information or financial information without authorization. 
 
CAN-SPAM Act - Answer Anti spam 
 
Electronic Communicat...
Preview 1 out of 3 pages
Add to cartPenetration-Testing Methodologies - Answer 1. Black Box 
2. White Box 
3. Gray Box 
 
Computer Fraud Abuse Act - Answer This law makes it a federal crime to access classified information or financial information without authorization. 
 
CAN-SPAM Act - Answer Anti spam 
 
Electronic Communicat...
Daisy Chaining - Answer Gaining access to one network and/or computer and then using the same information to gain access to multiple networks and computers that contain desirable info 
 
Confidentiality - Answer Assurance that the information is accessible only to those authorized to have access...
Preview 4 out of 42 pages
Add to cartDaisy Chaining - Answer Gaining access to one network and/or computer and then using the same information to gain access to multiple networks and computers that contain desirable info 
 
Confidentiality - Answer Assurance that the information is accessible only to those authorized to have access...
Threat - Answer What refers to the likelihood of a successful attack? 
 
Red team - Answer What color team simulates being an Advanced Persistent Threat against the network? 
 
Whois - Answer What publicly accessible online database contains information about domains and their owners? 
 
NS - ...
Preview 2 out of 6 pages
Add to cartThreat - Answer What refers to the likelihood of a successful attack? 
 
Red team - Answer What color team simulates being an Advanced Persistent Threat against the network? 
 
Whois - Answer What publicly accessible online database contains information about domains and their owners? 
 
NS - ...
Social engineers are master manipulators. What techniques might they use? - Answer Moral obligation ignorance and threatening 
 
What best describes a script kiddie? - Answer Hacker using scripts written by much more talented individuals 
 
Attacks involving human interaction are? - Answer ...
Preview 1 out of 4 pages
Add to cartSocial engineers are master manipulators. What techniques might they use? - Answer Moral obligation ignorance and threatening 
 
What best describes a script kiddie? - Answer Hacker using scripts written by much more talented individuals 
 
Attacks involving human interaction are? - Answer ...
If you have been contracted to perform an attack against a target system, you are what type 
of hacker? 
A. White hat 
B. Gray hat 
C. Black hat 
D. Red hat - Answer A. A white hat hacker always has permission to perform pen testing against a target system. 
 
Which of the following describes an a...
Preview 3 out of 29 pages
Add to cartIf you have been contracted to perform an attack against a target system, you are what type 
of hacker? 
A. White hat 
B. Gray hat 
C. Black hat 
D. Red hat - Answer A. A white hat hacker always has permission to perform pen testing against a target system. 
 
Which of the following describes an a...
White-hat testing, which involves testing with the knowledge and consent of the organizations IT staff, is also known as: - Answer D. Overt testing 
 
Social engineering can be used to accomplish: - Answer D. All of the above 
 
Which nmap command option performs a scan using the initial TCP han...
Preview 2 out of 9 pages
Add to cartWhite-hat testing, which involves testing with the knowledge and consent of the organizations IT staff, is also known as: - Answer D. Overt testing 
 
Social engineering can be used to accomplish: - Answer D. All of the above 
 
Which nmap command option performs a scan using the initial TCP han...
D. Digital certificate - Answer How is the public key distributed in an orderly, controlled fashion so that the users can be sure 
of the sender's identity? 
 
A. Hash value 
B. Digital signature 
C. Private key 
D. Digital certificate 
 
E. All are DDOS tools - Answer What do Trinoo, TFN2k, Wi...
Preview 3 out of 17 pages
Add to cartD. Digital certificate - Answer How is the public key distributed in an orderly, controlled fashion so that the users can be sure 
of the sender's identity? 
 
A. Hash value 
B. Digital signature 
C. Private key 
D. Digital certificate 
 
E. All are DDOS tools - Answer What do Trinoo, TFN2k, Wi...
ISO 27001 - Answer Considered the Governance standard, based on BS 7799. Defines a standard for creating an IS Management System. 
 
Focuses on Security Governance. 
 
ISO 27002 - Answer Considered the security controls standard, based on BS 7799. Recommends security controls based on industry b...
Preview 3 out of 17 pages
Add to cartISO 27001 - Answer Considered the Governance standard, based on BS 7799. Defines a standard for creating an IS Management System. 
 
Focuses on Security Governance. 
 
ISO 27002 - Answer Considered the security controls standard, based on BS 7799. Recommends security controls based on industry b...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
No, you only buy these notes for $35.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
64438 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now