100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

cissp 2024 study prep with questions and answers

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
08-02-2025
Written in
2024/2025

cissp 2024 study prep with questions and answerswhat is due carewhat is due diligence

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker

Document information

Uploaded on
February 8, 2025
Number of pages
26
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Sniffer
Packet sniffing programs are called sniffers and they are designed to capture
packets that contain information such as passwords, router configuration, traffic, and
more.
Data backup strategy steps
Identify important data

Choose the appropriate backup media

Choose the appropriate backup technology

Choose the appropriate RAID levels

Choose the appropriate backup method

Choose the appropriate location

Choose the backup type

Choose the appropriate backup solution

Perform a recovery test
WPA2-Personal
WPA2-Personal encryption uses a pre-shared key (PSK) to protect the network
access.
Threat modeling
Threat modeling is an assessment approach in which the security of an application is
analyzed. It helps in identifying threats that are relevant to the application,
discovering application vulnerabilities, and improve the security.
Administrative security policies
Administrative policies define the behaviour of employees.
Doxing
Doxing is revealing and publishing personal information about someone. It involves
gathering private and valuable information about a person or organization and then
misusing that information for different reasons.
Recovery controls
Recovery controls are used after a violation has happened and system needs to be
restored to its persistent state. These may include backup systems or disaster
recovery.
Confidentiality attack
Confidentiality attack is where an attacker attempts to intercept confidential
information transmitted over the network.
Proprietary Methodologies
Proprietary methodologies are usually devised by the security companies who offer
pentesting services and as such are kept confidential. Examples of proprietary
methodologies include:
-IBM
-McAfee Foundstone
-EC-Council LPT
Five stages of hacking

,Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing tracks
Script kiddies
Script kiddies are hackers who are new to hacking and don't have much knowledge
or skills to perform hacks. Instead, they use tools and scripts developed by more
experienced hackers.
Application keylogger
Application keylogger is designed to observe the target's activity whenever they type
something. It can record emails, passwords, messages, browsing activities, and
more.
Ethical hacking guidelines
No test should be performed without an appropriate permission and authorization
Keep the test results confidential (usually an NDA is signed)
Perform only those tests that the client had previously agreed upon
CVSS
The Common Vulnerability Scoring System (CVSS) provides a way to capture the
principal characteristics of a vulnerability, and produce a numerical score reflecting
its severity. The numerical score can then be translated into a qualitative
representation (such as low, medium, high, and critical) to help organizations
properly assess and prioritize their vulnerability management processes.
Man-in-the-middle attack
Man-in-the-middle attack is when an attacker gains access to the communication
channel between a target and server. The attacker is then able to extract the
information and data they need to gain unauthorized access.
Breaking WPA/WPA2 Encryption: Brute-force WPA Keys
Brute-Force WPA Keys is a technique in which the attacker uses dictionary or
cracking tools to break WPA encryption keys. This attack takes a lot of time to break
the key.
Web application threats
Attacks that take advantage of poorly written code and lack of proper validation on
input and output data. Some of these attacks include SQL injection and cross-site
scripting.
Out-of-band SQL injection
Out-of-band SQL injection is an injection attack in which the attacker uses more
channels to inject malicious queries and retrieve results.
Management zone
This is a secured zone which enforces strict policies and limits access to a few
authorized users.
List scanning
List scanning indirectly discovers hosts. This scan works by listing out IP addresses
and names without pinging the hosts and with performing a reverse DNS resolution
to identify the names of the hosts.
Types of penetration testing
Black box testing
Grey box testing
White box testing
Social engineering types

, Human-based social engineering
Computer-based social engineering
Mobile-based social engineering
Passive type
The hacker does not interact with the target. Instead, they rely on information that is
publicly available.
Website defacement attack
Website defacement attack is an attack in which the attacker makes changes to the
target website's content.
White hat
White hats are ethical hackers who use their knowledge and skills to improve
security of a system by discovering vulnerabilities before black hats do. They use the
same methods and tools black hats do, but unlike black hats, white hats have
permission from the system owner to use those methods.
Website mirroring (cloning)
Website mirroring or website cloning refers to the process of duplicating a website.
Mirroring a website helps in browsing the site offline, searching the website for
vulnerabilities, and discovering valuable information.
incident management
Incident management refers to the process of identifying, analyzing, prioritizing, and
solving security incidents. The goal is not only to restore the system back to normal,
but also prevent any potential risks and threats by triggering alerts.
Information that is being collected can include:
Physical and logical locations
Analog connections
Contact information
Information about other organizations
Computer-based social engineering
Computer-based social engineering involves using computers and information
systems for collecting sensitive and important information.
Attack on sensitive information
Refers to hackers breaking into clouds and stealing information about other users.
Such information usually includes credit card numbers and other financial data.
Authentication attack
Authentication attack is an attack in which the attacker attempts to steal the identity
of a user and gain access to the network.
Website footprinting
Website footprinting is a technique in which information about the target is collected
by monitoring the target's website. Hackers can map the entire website of the target
without being noticed.
Device enumeration sheet
ID of the device
Description
Hostname
Physical location
IP and MAC address
Botnets
Bots are malicious programs used by hackers to control the machines they've
infected. Hackers use bots to perform malicious activities from the machines on
$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
membafrancis1

Get to know the seller

Seller avatar
membafrancis1 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
10 months
Number of followers
0
Documents
120
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions