100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH V12 Module 1-5 UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
10-12-2024
Written in
2024/2025

CEH V12 Module 1-5 UPDATED ACTUAL Exam Questions and CORRECT Answers Hacker Classes - CORRECT ANSWER- Script Kiddies, State Sponsored, White Hat, Black Hat, Grey Hat, Cyber Terrorist, Suicide Hackers, Hacktivist, Hacker Teams, Industrial Spies, Insiders, Organised Hackers, Criminal Syndicates

Show more Read less
Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker

Document information

Uploaded on
December 10, 2024
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH V12 Module 1-5 UPDATED ACTUAL
Exam Questions and CORRECT Answers
Hacker Classes - CORRECT ANSWER- Script Kiddies, State Sponsored, White Hat, Black
Hat, Grey Hat, Cyber Terrorist, Suicide Hackers, Hacktivist, Hacker Teams, Industrial Spies,
Insiders, Organised Hackers, Criminal Syndicates


6 Cyber Laws in the UK - CORRECT ANSWER- Data Protection Act, GDPR,
Communications Act, Trade Marks Act, Network and Information Systems Regulation,
Investigatory Powers Act.


Why is Ethical Hacking Necessary? - CORRECT ANSWER- In order to stop an attacker
someone needs to know how the attacks are done in the fort place


AI and ML roles in cyber security - CORRECT ANSWER- Intrusion detection software can
be powered by AI and ML.
Learn how attacks happen and be able to detect patterns. techniques attackers may use.


What is Defensive Info War? - CORRECT ANSWER- Trying to secure data/info from being
stolen by enimines


What if Offensive Info War? - CORRECT ANSWER- Trying to steal enimines data in order
to gain intel


Elements of Info Security - CORRECT ANSWER- CIA Triangle.
Confidentially
Integrity
Accessibility/Authenticity
Non-Reputability - Truth cannot be brought into question

, ISO 27001:2013 - CORRECT ANSWER- Standard for the requirements for establishing,
implementing, maintaining, and improving an information security management system within
the context of an organisation


Passive Attacks - CORRECT ANSWER- Not tampering with data
Vulnerability analysis
Listening on ports


Active Attacks - CORRECT ANSWER- Actively doing soothing malicious



Close-In Attacks - CORRECT ANSWER- When the attacker is physically close to the victim
Could be phishing attacks
Plugging USB in


Insider Attack - CORRECT ANSWER- When someone trusted inside the network attacks



Distribution Attack - CORRECT ANSWER- When the source code of a software/hardware
component is changed to gain a vulnerability


Stages of the CEH Hacking Methodology - CORRECT ANSWER- Foot printing
Scanning
Enumeration
Vulnerability Analysis
System Hacking
Gaining Access
Escalating Privilege
Maintaining Access
Clearing Logs

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1077
Member since
1 year
Number of followers
102
Documents
68972
Last sold
9 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions