100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Certified Ethical Hacker (CEH) UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
10-12-2024
Written in
2024/2025

Certified Ethical Hacker (CEH) UPDATED Exam Questions and CORRECT Answers Confidentiality - CORRECT ANSWER- The measures taken to prevent disclosure of information or data to unauthorized individuals or systems. Integrity - CORRECT ANSWER- The methods and actions taken to protect the information from unauthorized alteration or revision - whether the data is at rest or in transi

Show more Read less
Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker

Document information

Uploaded on
December 10, 2024
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Certified Ethical Hacker (CEH) UPDATED
Exam Questions and CORRECT Answers
Confidentiality - CORRECT ANSWER- The measures taken to prevent disclosure of
information or data to unauthorized individuals or systems.


Integrity - CORRECT ANSWER- The methods and actions taken to protect the information
from unauthorized alteration or revision - whether the data is at rest or in transit.


Hash - CORRECT ANSWER- A one-way mathematical algorithm that generates a specific,
fixed-length number.


Bit Flipping - CORRECT ANSWER- A type of integrity attack where the attacker
manipulates bit in the ciphertext to generate a predictable outcome in the plaintext once it is
decrypted.


Availability - CORRECT ANSWER- Refers to communications and data being ready for use
when legitimate users need them.


Denial of Service (DoS) Attacks - CORRECT ANSWER- Designed to prevent legitimate
users from having access to computer resources.


Ethical Hacker - CORRECT ANSWER- Someone who employs the same tools and
techniques a criminal might use, with the customer's full support and approval, in order to secure
a network or system.


Cracker - CORRECT ANSWER- Also known as a malicious hacker, uses their skills for
either personal gain or destructive purposes.


White Hats - CORRECT ANSWER- These are the ethical hackers, hired by a customer for
the specific goal of testing and improving security.

,Black Hats - CORRECT ANSWER- These are the bad guys; the crackers, illegally using
their skills for either personal gain or malicious intent.


Gray Hats - CORRECT ANSWER- The hardest group to categorize; these people are neither
good nor bad.


Penetration Test - CORRECT ANSWER- A clearly defined, full-scale test of the security
controls of a system or network in order to identify security risks and vulnerabilities and has
three main phases.


Black box testing - CORRECT ANSWER- The ethical hacker has zero knowledge of the
target of evaluation (TOE). Simulates an outside attacker, takes the most time to complete, and is
the most expensive option.


White box testing - CORRECT ANSWER- The exact opposite of black box testing; pen
testers have full knowledge of the network/system. Simulates a knowledgeable, internal threat.


Gray box testing - CORRECT ANSWER- Also known as partial knowledge testing; assumes
only that the attacker is an insider. This type of testing is very valuable because it can
demonstrate privilege escalation from a trusted employee.


Asset - CORRECT ANSWER- An item of economic value owned by an organization or
individual.


Threat - CORRECT ANSWER- Any agent, circumstance, or situation that could cause harm
or loss to an IT asset.


Vulnerability - CORRECT ANSWER- Any weakness that could be exploited by a threat to
cause damage to an asset.

, United State Code Title 18, Section 1029 - CORRECT ANSWER- Criminalizes the misuse
of credentials; including selling devices that make fake credentials and those who traffic the
faked credentials


United States Code Title 18, Section 1030 - CORRECT ANSWER- Targets hackers
themselves and criminalizes unauthorized access to computer systems or data. Also addresses
and criminalizes the spread of viruses and malware.


The SPY Act - CORRECT ANSWER- Criminalizes the collection of personal information
without the user's consent, the redirection of web servers, and the sending of spam.


Freedom of Information Act - CORRECT ANSWER- Serves the people's right to know
certain pieces of information not deemed to be classified.


Privacy Act of 1974 - CORRECT ANSWER- States that government agencies cannot
disclose personal information about an individual without the person's consent.


Federal Information Security Management Act (FISMA) - CORRECT ANSWER- Requires
government agencies to create security plans, have them accredited at least once every three
years, and periodically asses the security.


USA Patriot Act of 2001 - CORRECT ANSWER- Dramatically increased the government's
ability to monitor, intercept, and maintain records on many forms of communication.


Attack Types - CORRECT ANSWER- Operating System Attacks
Application-level Attacks
Shrink-wrap Code Attacks
Misconfiguration Attacks


Operating system attacks - CORRECT ANSWER- Target operating systems that were
installed with all the defaults left unchanged.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1077
Member since
1 year
Number of followers
102
Documents
68972
Last sold
9 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions