100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
CEH v12 Flashcards Questions with Answers €14,32   In winkelwagen

Tentamen (uitwerkingen)

CEH v12 Flashcards Questions with Answers

 13 keer bekeken  0 keer verkocht
  • Vak
  • CEH v12
  • Instelling
  • CEH V12

CEH v12 Flashcards Questions with Answers Simple Object Access Protocol (SOAP) - Answer-is a messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. It uses XML Information Set for its message format, and relies on applicat...

[Meer zien]

Voorbeeld 3 van de 23  pagina's

  • 12 augustus 2024
  • 23
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • CEH v12
  • CEH v12
avatar-seller
CEH v12 Flashcards Questions with
Answers

Simple Object Access Protocol (SOAP) - Answer-is a messaging protocol specification
for exchanging structured information in the implementation of web services in computer
networks. It uses XML Information Set for its message format, and relies on application
layer protocols, most often Hypertext Transfer Protocol (HTTP)

DNS Sinkhole - Answer-is a DNS server that has been configured to hand out non-
routable addresses for a certain set of domain names.

Slowloris Attack - Answer-is a type of denial of service attack tool which allows a single
machine to take down another machine's web server with minimal bandwidth and side
effects on unrelated services and ports. It tries to keep many connections to the target
web server open and hold them open as long as possible. It accomplishes this by
opening connections to the target web server and sending a partial request.
Periodically, it will send subsequent HTTP headers, adding to, but never completing, the
request.

Snort - Answer-a free open source network intrusion detection system and intrusion
prevention system created in 1998 by Martin Roesch, founder and former CTO of
Sourcefire. Snort is now developed by Cisco, which purchased Sourcefire in 2013.

Source Routing/Path Addressing - Answer-allows a sender of a packet to partially or
completely specify the route the packet takes through the network.

Split DNS - Answer-is the facility of a Domain Name System (DNS) implementation to
provide different sets of DNS information, usually selected by the source address of the
DNS request.

Sublist3r - Answer-a python tool designed to enumerate subdomains of websites using
OSINT.

Sybil Attack - Answer-is an attack against peer-to-peer networks in which a single
attacker creates many fake identities to gain an advantage in the network. Other users
do not recognize these identities as fictitious, which gives the attacker a
disproportionately large influence over the network.

TheHarvester - Answer-a simple to use, yet powerful tool designed to be used during
the reconnaissance stage of a red team assessment or penetration test. It performs

,open source intelligence (OSINT) gathering to help determine a domain's external threat
landscape.

Tor - Answer-is free and open-source software for enabling anonymous communication.
It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting
of more than seven thousand relays, to conceal a user's location and usage from
anyone performing network surveillance or traffic analysis.

Traceroute (Linux) / Tracert (Windows) - Answer-are computer network diagnostic
commands for displaying possible routes (paths) and measuring transit delays of
packets across an Internet Protocol (IP) network. The history of the route is recorded as
the round-trip times of the packets received from each successive host (remote node) in
the route (path); the sum of the mean times in each hop is a measure of the total time
spent to establish the connection. Uses ICMP

Boot Sector Virus - Answer-a type of malware that infects a system's boot partition or
the Master Boot Record (MBR) of a hard disk. During startup and before security
software can be executed, the virus executes malicious code.

Metamorphic Virus - Answer-is code that when run outputs a logically equivalent version
of its own code under some interpretation.

VulDB - Answer-Number one vulnerability management and threat intelligence platform
documenting and explaining vulnerabilities since 1970.

Wardriving - Answer-is the act of searching for Wi-Fi wireless networks, usually from a
moving vehicle, using a laptop or smartphone.

Watering Hole Attack - Answer-is a computer attack strategy in which an attacker
guesses or observes which websites an organization often uses and infects one or
more of them with malware. Eventually, some member of the targeted group will
become infected.

ALTEr Attack - Answer-an attacker pretends to be a real cell tower to the victim, while at
the same time also pretending to be the victim to the real network, and then intercepts
the communications between the victim and the real network.

Android Package Kit - Answer-with the file extension apk is the file format used by the
Android operating system, and a number of other Android-based operating systems for
distribution and installation of mobile apps, mobile games and middleware. It can be
written in either Java or Kotlin.

Archive Org - Answer-is an American digital library with the stated mission of "universal
access to all knowledge".

, Armitage - Answer-is a graphical cyber attack management tool for the Metasploit
Project that visualizes targets and recommends exploits. It is a free and open source
network security tool notable for its contributions to red team collaboration allowing for:
shared sessions, data, and communication through a single Metasploit instance.

Auth0 - Answer-Rapidly integrate authentication and authorization for web, mobile, and
legacy applications so you can focus on your core business.

BeEF - Answer-is short for The Browser Exploitation Framework. It is a penetration
testing tool that focuses on the web browser.

Birthday Attack - Answer-This attack can be used to abuse communication between two
or more parties. The attack depends on the higher likelihood of collisions found between
random attack attempts and a fixed degree of permutations (pigeonholes).

Block Chain - Answer-is a type of distributed ledger technology (DLT) that consists of
growing list of records, called blocks, that are securely linked together using
cryptography.

Block Cipher Mode of Operation - Answer-an algorithm that uses a block cipher to
provide information security such as confidentiality or authenticity.

Electronic code book mode - Answer-The simplest (and not to be used anymore) of the
encryption modes (named after conventional physical codebooks). The message is
divided into blocks, and each block is encrypted separately.

BlueBorne - Answer-is a type of security vulnerability with Bluetooth implementations in
Android, iOS, Linux and Windows. It affects many electronic devices such as laptops,
smart cars, smartphones and wearable gadgets.

Bluto - Answer-is a Python-based tool for DNS recon, DNS zone transfer testing, DNS
wild card checks, DNS brute forcing, e-mail enumeration and more.

Brute Force Attack - Answer-consists of an attacker submitting many passwords or
passphrases with the hope of eventually guessing correctly.

Buffer Overflow - Answer-is an anomaly whereby a program, while writing data to a
buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

Burp Suite - Answer-is an integrated platform/graphical tool for performing security
testing of web applications.

Carrier Cloud - Answer-is a class of cloud that integrates wide area networks (WAN)
and other attributes of communications service providers' carrier grade networks to
enable the deployment of highly complex applications in the cloud.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €14,32. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 83750 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€14,32
  • (0)
  Kopen