100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CEH v10 vocabulary | Questions And Answers Latest {} A+ Graded | 100% Verified

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
20-08-2024
Written in
2024/2025

CEH v10 vocabulary | Questions And Answers Latest {} A+ Graded | 100% Verified

Institution
Top Academic Resources 2024/2025
Course
Top Academic Resources 2024/2025









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Top Academic Resources 2024/2025
Course
Top Academic Resources 2024/2025

Document information

Uploaded on
August 20, 2024
Number of pages
12
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH v10 vocabulary | Questions And Answers Latest {2024- 2025} A+ Graded | 100%
Verified


5 zone of ECC - Internet, Internet DMZ, Production Network Zone, Intranet Zone, Management Network
Zone



7 layers of OSI model - Application, Presentation, Session, Transport, Network, Data Link, and Physical



four layers of the TCP/IP stack - Application, Transport, Internet, and Network Access



TCP/IP Frame - Preamble, Start Frame Delimiter(SFD), Destination Address, Source Address,
Length/type, Data,Frame Check Sequence (FCS)



3-way Handshake - SYN, SYN/ACK, ACK



Security, Functionality and Usability - Level of security in any system can be defined by the strength of
three components.



Threat Modeling - a risk assessment approach for analyzing security of an application by capturing,
organizing, and analyzing all the information that affects the security of an application



Zero-day - An attack that exploits computer application vulnerabilities before the software developer
releases a patch for the vulnerability



Daisy-chaining - It involves gaining access to one network and/or computer and then using the same
information to gain access to multiple networks and computers that contain desirable information



bots - a software application that can be use to control systems remotely to execute or automate
predefined tasks. Hackers use this to carry out malicious activity over the Internet such as distributed
denial-of-service (DDoS) attacks, keylogging, spying, etc

, doxing - Publishing personally identifiable information about an individual collected from publicly
available databases and social media. People with malicious intent collect this information from publicly
accessible channels such as the databases, social media and the Internet



IRT - Incident Response Team



Risk Management - this includes identifying organizational assets, threats to those assets, asset
vulnerabilities, exploring countermeasures to put in place to minimize risk as much as possible



3 types of controls - preventative, detective, or corrective



BIA - Business Impact analysis



MTD - Maximum Tolerable downtime: a means to prioritze the recovery of assets should the worst
occur



BCP - The Business Continuity plan is a set of plans and procedures to follow in the event of a failure or a
disaster to get business services up and running



DRP - Addressing what to do to recover any lost data or services. Disaster recovery plan



ALE - Annualized loss expectancy is the product of the ARO(Annual rate of occurence) and the SLE(Single
loss expectancy). It is the monetary loss that can be expected for an asset due to risk over a one-year
period.



Security Triad - Confidentiality, Integrity, Availability



Confidentiality - addressing the secrecy and privacy of information, refers to the measures taken to
prevent disclosure of information or data to unauthorized users or systems: Passwords are a common
measure

attacks against these are confidentiality attacks

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SpencerHenderson Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
229
Member since
2 year
Number of followers
116
Documents
31195
Last sold
1 day ago
Spencer Henderson

Spencer Henderson I offer updated and 100% verified exam materials for ATI, Nursing, PMHNP, TNCC, USMLE, ACLS, WGU, and more. Success is guaranteed. You’ll find everything you need for nursing exams and test banks here. If you don’t see what you’re looking for, just contact me— I will get it for you within minutes. Shop with confidence! And please remember to leave a review after your purchase to help ensure all our customers stay satisfied.

Read more Read less
3.7

46 reviews

5
18
4
9
3
12
2
1
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions