100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH v11 Comprehensive Study Guide Complete Questions Bank / Questions and Correct Detailed Answers

Rating
4.0
(3)
Sold
-
Pages
193
Grade
A+
Uploaded on
21-04-2025
Written in
2024/2025

Terms in this set (1749) Authentication The process of identifying a user's identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above. Botnet A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches. DDoS Using multiple hosts and users, hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to temporarily shut down. Domain A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity. Encryption Coding used to protect your information from hackers. Malware malicious software that damages or disables computer systems and gives limited or full control of the systems to the creator for malicious activities such as theft or fraud. Spoofing When a hacker changes the IP address of an email so that it seems to come from a trusted source

Show more Read less
Institution
CEH V11
Course
CEH v11











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH v11
Course
CEH v11

Document information

Uploaded on
April 21, 2025
Number of pages
193
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CEH v11 Comprehensive Study Guide Complete
Questions Bank / Questions and Correct Detailed
Answers


Terms in this set (1749)

Authentication The process of identifying a user's identity, making sure
that they can have access to the system and/or files. This
can be accomplished either by a password, retina scan, or
fingerprint scan, sometimes even a combination of the
above.


Botnet A network of computers that have been infected with a
virus, and now are working continuously in order to create
security breaches.

DDoS Using multiple hosts and users, hackers bombard a
website with a tidal wave of requests to such an extent
that it locks up the system and forces it to temporarily
shut down.


Domain A series of computers and associated peripherals (routers,
printers, scanners), that are all connected as one entity.



Encryption Coding used to protect your information from hackers.



Malware malicious software that damages or disables computer
systems and gives limited or full control of the systems to
the creator for malicious activities such as theft or fraud.




When a hacker changes the IP address of an email so that it
Spoofing
seems to come from a trusted source

,Spyware A type of malware that attackers install on a computer to
secretly gather information about its users without their
knowledge.


Trojan Horse A form of malware, this one a misleading computer
program that looks innocent, but in fact allows the hacker
into your system via a back door, allowing them to control
your computer.


Virus It infects a system by inserting itself into a file or executable
program. Malware which changes, corrupts, or destroys
information, and is then passed on to other systems, usually
by otherwise benign means.



VPN creates a safe and encrypted tunnel over a public network
to securely send and receive sensitive information. It
creates a subnet by using key-based encryption for secure
communication between endpoints.



Worm Malware that can reproduce itself for the purposes of
spreading itself to other computers in the network.

Hack Value The notion among hackers that something is worth doing or
is interesting.

Vulnerability An existence of a weakness, design, or implementation
error that may lead to compromising the security of the
system.

Exploit A breach of IT system security through vulnerabilities. It is
the part the malware that contains code or a sequence of
commands that can take advantage of a bug or vulnerability
in a digital system or device.


Payload Payload

Gaining access to one network and/or computer to obtain
Daisy Chaining information that will enable them to gain access to multiple
other computers and/or networks.

,Doxing Publishing personally identifiable information about an
individual that was obtain from public databases and
social media.


Bot A software application that can be remotely controlled to
execute/automate predefined tasks.

Information Security A state of infrastructure and information well-being to keep the
possibility of theft, tampering, disruption of information and
services kept tolerable and low.

Confidentiality The assurance that information is only accessible to authorized
individuals.

Integrity The trustworthiness of preventing improper and unauthorized
changes of data or resources.

Availability The assurance that the system which is responsible for the
processing, delivering and storing of information is
accessible to the authorized users when required.

Authenticity Any data, communication or document characteristics which
ensures the quality of being genuine.

Non-Repudiation Guarantees that an individual cannot later deny sending a
message and the recipient cannot deny receiving a message.



Cloud Computing An on-demand delivery of IT capabilities where infrastructure
and applications are provided to subscribers as a metered
service over a network.

Advanced Persistent An attack vector focuses on stealing data from a victims
Threats (APT) machine without their knowledge.

Cloud Computing Threats An attack vector is a flaw in within a client's
application cloud which can enable attackers to
access other client's data.



An attack is performed on a network or single computer by an
Insider Attacks
entrusted individual who has authorized access.

, Web Application Threats A security attack vector that threatens the performance of a
website and hampers its security to steal user credentials,
set up a phishing site or acquire private data by targeting
web applications.


SHA-1 A Secure Hashing Algorithm (SHA) that produces a 160-bit
digest from a message with a maximum length of (264 - 1)
bits, and resembles the MD5 algorithm.

Software as a Service Offers software to subscribers on-demand over the internet.
(SaaS)

Platform as a Service Offers development tools, configuration management, and
(PaaS) deployment platforms on-demand that can be used by
subscribers to develop custom applications.



Infrastructure as a Service Provides virtual machines and other abstracted
(IaaS) hardware and operating systems which may be
controlled through a service API.

Identify as a Service Offers IAM services including SSO, MFA, IGA and intelligence
(IDaaS) collection.

Security as a Service Provides Penetration testing, authentication, intrusion detection,
(SECaaS) anti-malware, security incident, and event management services.



Container as a Service Offers Virtualization of container engines, management of
(CaaS) containers, applications and clusters through a web portal or
API.

Function as a Service Provides a platform for developing, running and managing
(FaaS) application functionality for microservices.

Public Cloud Services are rendered over a network that is open for public use.



Private Cloud Cloud infrastructure is operated for a single organization only.



Shared Infrastructure between several organizations from a
Community Cloud
specific community with common concerns.
$22.99
Get access to the full document:
Purchased by 0 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Reviews from verified buyers

Showing all 3 reviews
7 months ago

7 months ago

7 months ago

4.0

3 reviews

5
0
4
3
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ExamsTest Abington State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3780
Member since
10 months
Number of followers
16
Documents
952
Last sold
1 week ago
Actual Tutor

Ace Your Exams with Premium Study Materials! Unlock your full potential with our expertly crafted revision materials. Whether you're prepping for exams, quizzes, or looking to solidify your understanding, Our study guides, summaries, and Questions banks are designated to simplify complex topics and enhance your knowledge retention. What to Expect Comprehensive Summaries: Key points made easy for quick revision. Test Banks: Practice with real exam- questions. Exam Prep Guides: Focused content to boost your scores. Instant Access: Download and start studying immediately! Don’t just study harder—study smarter! Excel in your exams with our trusted materials. Study, Learn and Excel

Read more Read less
4.4

1515 reviews

5
840
4
531
3
115
2
21
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions