100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH v12 Study Guide-Questions and Answers 100% Solved

Rating
-
Sold
-
Pages
51
Grade
A+
Uploaded on
23-09-2024
Written in
2024/2025

CEH v12 Study Guide-Questions and Answers 100% Solved

Institution
CEH V12
Course
CEH v12











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH v12
Course
CEH v12

Document information

Uploaded on
September 23, 2024
Number of pages
51
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH v12 Study Guide-Questions and Answers 100%
Solved
fuzz testing (fuzzing) Correct Ans-A software testing technique that deliberately provides


invalid, unexpected, or random data as inputs to a computer program.




Concolic Testing Correct Ans-Concolic testing is a hybrid software verification technique


that performs symbolic execution, a classical technique that treats program variables as


symbolic variables along a concrete execution path. Symbolic execution is used in conjunction


with an automated theorem prover or constaraint solver based on constraint logic


programming to generate new concrete inputs (test cases) to maximize code coverage. Its


main focus is finding bugs in real-world software rather than demonstrating program


correctness.




Monkey Testing Correct Ans-Monkey testing is a technique where the user tests the


application or system by providing random inputs and checking the behavior, or seeing


whether the application or system will crash. Monkey testing is usually implemented as


random, automated unit tests.

, CEH v12 Study Guide-Questions and Answers 100%
Solved
Security Testing Correct Ans-a process intended to reveal flaws in the security mechanisms


of an information system that protect data and maintain functionality as intended.




Firewalking Correct Ans-the method of determining the movement of a data packet from


an untrusted external host to a protected internal host through a firewall.




Session Hijacking Correct Ans-An attack in which an attacker attempts to impersonate the


user by using his session token.




Network Sniffing Correct Ans-theft or interception of data by capturing the network traffic


using a sniffer (an application aimed at capturing network packets).




MITM (Man-in-the-Middle) Correct Ans-a cyberattack where the attacker secretly relays


and possibly alters the communications between two parties who believe that they are


directly communicating with each other.

, CEH v12 Study Guide-Questions and Answers 100%
Solved


digital signature Correct Ans-Unforgeable and authentic




How to avoid NIDS? Correct Ans-Encryption




Slowloris Correct Ans-Attempts to monopolize by sending HTTP requests that never


complete


Eventually consumes Web server's connection capacity


Utilizes legitimate HTTP traffic


Existing intrusion detection and prevention solutions that rely on signatures to detect attacks


will generally not recognize this attack




HTTP Flood Correct Ans-a type of Distributed Denial of Service (DDoS) attack in which the


attacker manipulates HTTP and POST unwanted requests in order to attack a web server or


application.

, CEH v12 Study Guide-Questions and Answers 100%
Solved


Spoofed Session Flood Attack Correct Ans-Attackers create fake or spoofed TCP sessions by


carrying multiple SYN, ACK, and RST or FIN packets.




Fragmentation Correct Ans-a process used to partition messages (the service data unit


(SDU); typically a packet) from one layer of a network into multiple smaller payloads that can


fit within the lower layer's protocol data unit (PDU).




Reconissance Stage Correct Ans-attackers act like detectives, gathering information to


understand their target truly. From examining email lists to open source information, their


goal is to know the network better than those who run and maintain it. They hone in on the


technology's security aspect, study the weaknesses, and use any vulnerability to their


advantage.




Compromised Data Integrity Correct Ans-As SQL statements are also used to modify or add


the record, an attacker can use SQL injection to modify or add data stored in a database.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheeGrades NEWCASTLE UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
98
Member since
1 year
Number of followers
5
Documents
12943
Last sold
2 days ago
THEEGRADES

Ace Your Exams with Premium Study Guides! Unlock your full potential with our expertly crafted revision materials. Whether you're prepping for exams, quizzes, or looking to solidify your understanding, we've got you covered. Our study guides, summaries, and test banks are designed to simplify complex topics and enhance your knowledge retention. What We Offer: Comprehensive Summaries: Key points made easy for quick revision. Test Banks: Practice with real exam-like questions. Exam Prep Guides: Focused content to boost your scores. Instant Access: Download and start studying immediately! Don’t just study harder—study smarter! Excel in your exams with our trusted materials. You are Welcome. SUCCESS!!!

Read more Read less
3.3

24 reviews

5
9
4
4
3
3
2
1
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions