Certified Ethical Hacking questions with correct answers
Threat - Answer Is an environment or situation that could lead to a potential breach of security. Exploit - Answer Is a piece of software that takes an advantage of a bug, glitch, or vulnerability, leading to an unauthorized access, privilege escalation, or denial of service on a computer system. Remote Exploit - Answer Works over a network and exploits security vulnerabilities without any prior access to the vulnerable system. Local Exploit - Answer Requires prior access to the vulnerable system to increase privileges. Vulnerability - Answer Is an existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. Target of Evaluation - Answer Is a system, program, or network that is the subject of a security analysis or attack. Attack - Answer Occurs when a system is compromised based on a vulnerability. (Many are perpetrated via an Exploit) Five stages of an attack (Really-Should-Get-More-Codes) - Answer Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks
École, étude et sujet
- Établissement
- CEH - Certified Ethical Hacker
- Cours
- CEH - Certified Ethical Hacker
Infos sur le Document
- Publié le
- 20 juin 2023
- Nombre de pages
- 9
- Écrit en
- 2022/2023
- Type
- Examen
- Contient
- Questions et réponses
Sujets
-
certified ethical hacking questions with correct a
Document également disponible en groupe