Certified Ethical Hacker (CEH)| Questions and Answers with complete solution
Directory Transversal - Finding a directory listing and gaining access to a parent or root file for access to other files Incremental Substitution - Replacing numbers in a url to access other files Vulnerability Scanning - The automated process of proactively identifying vulnerabilities of computing systems present in a network Network Scanning - A procedure for identifying active hosts on a network. Port Scanning - A series of messages sent by someone attempting to break into a computer to learn about the computer's network services. TCP SYN Scan - -sS TCP connect() scan - -sT FIN Scan - -sF Xmas Tree scan - -sX Ping Scan - -sP Version Detection Scan - -sV UDP Scan - -sU
Written for
- Institution
- Certified Ethical Hacker
- Course
- Certified Ethical Hacker
Document information
- Uploaded on
- June 28, 2023
- Number of pages
- 3
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacker ceh
Also available in package deal