100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH V12 UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
10-12-2024
Written in
2024/2025

CEH V12 UPDATED ACTUAL Exam Questions and CORRECT Answers What is the phases of the Cyber Kill Chain - CORRECT ANSWER- Recon, Weaponization, Delivery, Exploitation, Install, CNC & Action Which of the ICMP messages are used by most traceroute programs to determine the IP addresses of intermediate routers? - CORRECT ANSWER- Type 11

Show more Read less
Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker

Document information

Uploaded on
December 10, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH V12 UPDATED ACTUAL Exam
Questions and CORRECT Answers
What is the phases of the Cyber Kill Chain - CORRECT ANSWER- Recon, Weaponization,
Delivery, Exploitation, Install, CNC & Action


Which of the ICMP messages are used by most traceroute programs to determine the IP
addresses of intermediate routers? - CORRECT ANSWER- Type 11



What is the goal of enumeration? - CORRECT ANSWER- To gather as much information
about the network as possible


The type of scan that is when the source address is spoofed to the target but requires a zombie. -
CORRECT ANSWER- Idle Scan



Scan that goes through IP address ranges provided by user - CORRECT ANSWER- Listing
Scan


Unique scan that only works on UNIX and Linux where no is a sign of an open port. -
CORRECT ANSWER- NULL Scan



Which information may be gathered using nslookup? - CORRECT ANSWER- Hostnames
and IP addresses


Adversary behavior Powershell - CORRECT ANSWER- Automation tool to transfer data



Adversary behavior Command line - CORRECT ANSWER- Gain access to read files or
their contents

, Adversary behavior CNC Servers - CORRECT ANSWER- Communicate remotely to the
system


Adversary behavior DNS tunneling - CORRECT ANSWER- Hide malicious traffic



What is the goal of ethical hacking? - CORRECT ANSWER- To detect security flaws before
they are exploited by attackers


What does covering your tracks mean? - CORRECT ANSWER- Concealing Activity


What is the name of a set of software tools that allows an attacker to access a target remotely and
remain hidden. - CORRECT ANSWER- A rootkit



Which of the following attacks is considered hard to detect? - CORRECT ANSWER-
Passive


What standard specifies the requirements for implementing, maintaining, establishing and
continually improving systems. - CORRECT ANSWER- IEC 2701 and 2013


Protects the public and investors with accurate and reliably corporate disclosures. - CORRECT
ANSWER- Sarbanes-Oxley (SOX) Act



Global level privacy and security laws? - CORRECT ANSWER- General Data Protection
Regulation (GDPR)


Two different treaties that guard against copyright infringement. - CORRECT ANSWER-
Digital Millennium Copyright Act


What is Extension walking? - CORRECT ANSWER- Use of Google operators to change the
file types

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1077
Member since
1 year
Number of followers
102
Documents
68972
Last sold
9 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions