CEH v10 Study Test Questions with Correct Answers
Four benefits of footprinting - Answer-1. Know the security posture
2. Reduce the focus area (network range, number of targets, etc.)
3. Identify vulnerabilities
4. Draw a network map
Computer Fraud and Abuse Act of 1986 - Answer-makes con...
CEH v10 Study Test Questions with Correct
Answers
Four benefits of footprinting - Answer-1. Know the security posture
2. Reduce the focus area (network range, number of targets, etc.)
3. Identify vulnerabilities
4. Draw a network map
Computer Fraud and Abuse Act of 1986 - Answer-makes conspiracy to commit hacking
a crime.
Enterprise Information Security Architecture (EISA) - Answer-a collection of
requirements and processes that help determine how an organizations information
systems are built and how they work.
Incident Management Process - Answer-To restore all systems to normal operations
asap.
Incident Management Process Order - Answer-1. Review Detection
2. Analyze Exploitation
3. Notify Stakeholders
4. Contain the exploitation
5. Eradicate backdoors
6. Coordinate recovery for lost data or services
7. Provide reports and lessons learned
Permissive Policy - Answer-blocks only things that are known to be dangerous
Prudent Policy - Answer-provides max security but allows some potentially and known
dangerous services because of business needs.
, Paranoid policy - Answer-locks everything down, not even allowing the user to open so
much as an internet browser.
Sarbanes-Oxley Act - Answer-to make corporate disclosures more accurate and reliable
in order to protect the public and investors from shady behavior
Payment Card Industry Data Security Standard (PCI DSS) - Answer-is a security
standard for organizations handling credit cards, ATM cards, and other point of sales
cards.
ISO 27000 Series - Answer-this series contains a range of individual standards and
documents specifically reserved by ISO for information security
Confidentiality - Answer-a bond of trust that involves refusing to reveal details about a
company, product, resource, or any other sensitive and/or proprietary information.
FTP (File Transfer Protocol) - Answer-TCP Port 21.
Telnet - Answer-TCP 23
SMTP (Simple Mail Transfer Protocol) - Answer-TCP 25
Volumetric Attacks - Answer-Consumes the bandwidth of target network or service.
Fragmentation Attacks - Answer-Overwhelms targets ability of re-assembling the
fragmented packets
TCP State-Exhaustion Attacks - Answer-Consumes the connection state tables present
in the network infrastructure components such as load-balancers, firewalls, and
application servers
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R244,09. You're not tied to anything after your purchase.