Certified Ethical Hacking questions with correct answers
Threat - Answer Is an environment or situation that could lead to a potential breach of security. Exploit - Answer Is a piece of software that takes an advantage of a bug, glitch, or vulnerability, leading to an unauthorized access, privilege escalation, or denial of service on a computer system. Remote Exploit - Answer Works over a network and exploits security vulnerabilities without any prior access to the vulnerable system. Local Exploit - Answer Requires prior access to the vulnerable system to increase privileges. Vulnerability - Answer Is an existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. Target of Evaluation - Answer Is a system, program, or network that is the subject of a security analysis or attack. Attack - Answer Occurs when a system is compromised based on a vulnerability. (Many are perpetrated via an Exploit) Five stages of an attack (Really-Should-Get-More-Codes) - Answer Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks
Written for
- Institution
- CEH - Certified Ethical Hacker
- Course
- CEH - Certified Ethical Hacker
Document information
- Uploaded on
- June 20, 2023
- Number of pages
- 9
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacking questions with correct a
Also available in package deal