CEH v11 Exam
CEH v11 Exam Authentication - The process of identifying a user's identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above. Botnet - A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches. DDoS - Using multiple hosts and users, hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to temporarily shut down. Domain - A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity. Encryption - Coding used to protect your information from hackers. Malware - malicious software that damages or disables computer systems and gives limited or full control of the systems to the creator for malicious activities such as theft or fraud. Spoofing - When a hacker changes the IP address of an email so that it seems to come from a trusted source Spyware - A type of malware that attackers install on a computer to secretly gather information about its users without their knowledge. Trojan Horse - A form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer. Virus - It infects a system by inserting itself into a file or executable program. Malware which changes, corrupts, or destroys information, and is then passed on to other systems, usually by otherwise benign means. VPN - creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information. It creates a subnet by using key-based encryption for secure communication between endpoints. Worm - Malware that can reproduce itself for the purposes of spreading itself to other computers in the network. Hack Value - The notion among hackers that something is worth doing or is interesting. Vulnerability - An existence of a weakness, design, or implementation error that may lead to compromising the security of the system. Exploit - A breach of IT system security through vulnerabilities. It is the part the malware that contains code or a sequence of commands that can take advantage of a bug or vulnerability in a digital system or device. Payload - Payload Daisy Chaining - Gaining access to one network and/or computer to obtain information that will enable them to gain access to multiple other computers and/or networks. Doxing - Publishing personally identifiable information about an individual that was obtain from public databases and social media. Bot - A software application that can be remotely controlled to execute/automate predefined tasks. Information Security - A state of infrastructure and information well-being to keep the possibility of theft, tampering, disruption of information and services kept tolerable and low. Confidentiality - The assurance that information is only accessible to authorized individuals. Integrity - The trustworthiness of preventing improper and unauthorized changes of data or resources. Availability - The assurance that the system which is responsible for the processing, delivering and storing of information is accessible to the authorized users when required. Authenticity - Any data, communication or document characteristics which ensures the quality of being genuine. Non-Repudiation - Guarantees that an individual cannot later deny sending a message and the recipient cannot deny receiving a message. Cloud Computing - An on-demand delivery of IT capabilities where infrastructure and applications are provided to subscribers as a metered service over a network. Advanced Persistent Threats (APT) - An attack vector focuses on stealing data from a victims machine without their knowledge. Cloud Computing Threats - An attack vector is a flaw in within a client's application cloud which can enable attackers to access other client's data. Insider Attacks - An attack is performed on a network or single computer by an entrusted individual who has authorized access. Web Application Threats - A security attack vector that threatens the performance of a website and hampers its security to steal user credentials, set up a phishing site or acquire private data by targeting web applications. SHA-1 - A Secure Hashing Algorithm (SHA) that produces a 160-bit digest from a message with a maximum length of (264 - 1) bits, and resembles the MD5 algorithm. Software as a Service (SaaS) - Offers software to subscribers on-demand over the internet. Platform as a Service (PaaS) - Offers development tools, configuration management, and deployment platforms on-demand that can be used by subscribers to develop custom applications. Infrastructure as a Service (IaaS) - Provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service API. Identify as a Service (IDaaS) - Offers IAM services including SSO, MFA, IGA and intelligence collection. Security as a Service (SECaaS) - Provides Penetration testing, authentication, intrusion detection, anti-malware, security incident, and event management services. Container as a Service (CaaS) - Offers Virtualization of container engines, management of containers, applications and clusters through a web portal or API. Function as a Service (FaaS) - Provides a platform for developing, running and managing application functionality for microservices. Public Cloud - Services are rendered over a network that is open for public use. Private Cloud - Cloud infrastructure is operated for a single organization only. Community Cloud - Shared Infrastructure between several organizations from a specific community with common concerns. Hybrid Cloud - Combination of two or more clouds that remain unique entities but are bound together, thereby offering the benefits of multiple deployment models. Multi Cloud - Dynamic heterogeneous environment that combines workloads across multiple cloud vendors, managed via one proprietary interface to achieve long term business goals. Cloud Consumer - A person or organization that uses cloud computing services. Cloud Provider - A person or organization that provides services to the interested parties. Cloud Carrier - Providing connectivity and transport services between cloud consumers and providers. Cloud Auditor - A party that can conduct independent assessment of cloud service controls and taking an opinion thereon. Cloud Broker - An entity that manages the use, performance and delivery of cloud services, and maintains relationships between cloud providers and consumers. Virtualization - The ability to run multiple operating systems on a single physical system. or multiple instances of one operating system and share the underlining resources such as a server, storage device or network. Containers - Placed on the top of one physical server and host operating system, and share the operating systems kernel binaries and libraries, thereby reducing the need for reproducing the OS. Docker - An open source technology used for developing, packaging and running applications and all its dependencies in the form of containers, to ensure that the application works in a seamless environment. It provides a PaaS through OS level virtualization and delivers containerized software packages. Kubernetes - An open source, portable, extensible, orchestration platform developed by Google for managing containerized applications and microservices. It provides a resilient framework for managing distributed containers, generating deployment patterns, and performing failover and redundancy for the applications. Network Sniffing - Interception and monitoring of network traffic which is being sent between the two cloud nodes. Packet Sniffers - Programs that capture data from information packets as they travel over the Internet or company networks. Captured data is sifted to find confidential or proprietary information. Side Channel Attack - An attack where an attacker runs a virtual machine on the same physical host as the victims virtual machine and takes advantage of the shared physical resources (processor cache) to steal data ( cryptographic keys) from the victim.
Escuela, estudio y materia
- Institución
- CEH v11
- Grado
- CEH v11
Información del documento
- Subido en
- 28 de junio de 2022
- Número de páginas
- 131
- Escrito en
- 2021/2022
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
ceh v11 exam