100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CEH v10 Study Test Questions with Correct Answers

Puntuación
-
Vendido
-
Páginas
12
Grado
A+
Subido en
12-08-2024
Escrito en
2024/2025

CEH v10 Study Test Questions with Correct Answers Four benefits of footprinting - Answer-1. Know the security posture 2. Reduce the focus area (network range, number of targets, etc.) 3. Identify vulnerabilities 4. Draw a network map Computer Fraud and Abuse Act of 1986 - Answer-makes conspiracy to commit hacking a crime. Enterprise Information Security Architecture (EISA) - Answer-a collection of requirements and processes that help determine how an organizations information systems are built and how they work. Incident response plan - Answer-1. Identify 2. Analyze 3. Prioritize 4. Resolve 5. Report Incident Management Process - Answer-To restore all systems to normal operations asap. Incident Management Process Order - Answer-1. Review Detection 2. Analyze Exploitation 3. Notify Stakeholders 4. Contain the exploitation 5. Eradicate backdoors 6. Coordinate recovery for lost data or services 7. Provide reports and lessons learned

Mostrar más Leer menos
Institución
CEH V10
Grado
CEH v10









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CEH v10
Grado
CEH v10

Información del documento

Subido en
12 de agosto de 2024
Número de páginas
12
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CEH v10 Study Test Questions with Correct
Answers
Four benefits of footprinting - Answer-1. Know the security posture
2. Reduce the focus area (network range, number of targets, etc.)
3. Identify vulnerabilities
4. Draw a network map

Computer Fraud and Abuse Act of 1986 - Answer-makes conspiracy to commit hacking
a crime.

Enterprise Information Security Architecture (EISA) - Answer-a collection of
requirements and processes that help determine how an organizations information
systems are built and how they work.

Incident response plan - Answer-1. Identify
2. Analyze
3. Prioritize
4. Resolve
5. Report

Incident Management Process - Answer-To restore all systems to normal operations
asap.

Incident Management Process Order - Answer-1. Review Detection
2. Analyze Exploitation
3. Notify Stakeholders
4. Contain the exploitation
5. Eradicate backdoors
6. Coordinate recovery for lost data or services
7. Provide reports and lessons learned

Hacking Phases - Answer-Recon - > Scanning -> Gain Access - > Maintain access ->
Clearing tracks

Promiscuous Policy - Answer-wide open

Permissive Policy - Answer-blocks only things that are known to be dangerous

Prudent Policy - Answer-provides max security but allows some potentially and known
dangerous services because of business needs.

, Paranoid policy - Answer-locks everything down, not even allowing the user to open so
much as an internet browser.

Sarbanes-Oxley Act - Answer-to make corporate disclosures more accurate and reliable
in order to protect the public and investors from shady behavior

Payment Card Industry Data Security Standard (PCI DSS) - Answer-is a security
standard for organizations handling credit cards, ATM cards, and other point of sales
cards.

ISO 27000 Series - Answer-this series contains a range of individual standards and
documents specifically reserved by ISO for information security

Confidentiality - Answer-a bond of trust that involves refusing to reveal details about a
company, product, resource, or any other sensitive and/or proprietary information.


FTP (File Transfer Protocol) - Answer-TCP Port 21.

Telnet - Answer-TCP 23

SMTP (Simple Mail Transfer Protocol) - Answer-TCP 25

DNS (Domain Name System) - Answer-TCP 53
UDP 53

HTTP - Answer-TCP 80

RPC (Remote Procedure Call) - Answer-Port 135 TCP/UDP

NetBIOS (Network Basic Input/Output System) - Answer-tcp/139, udp/137, udp/138 -
Network communication servers for LANs that use NetBIOS

SNMP (Simple Network Management Protocol) - Answer-UDP 161 and 162

LDAP (Lightweight Directory Access Protocol) - Answer-TCP/UDP 389

Global Catalog Service - Answer-TCP/UDP 3268

Volumetric Attacks - Answer-Consumes the bandwidth of target network or service.

Fragmentation Attacks - Answer-Overwhelms targets ability of re-assembling the
fragmented packets

TCP State-Exhaustion Attacks - Answer-Consumes the connection state tables present
in the network infrastructure components such as load-balancers, firewalls, and
application servers
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Scholarsstudyguide nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
780
Miembro desde
3 año
Número de seguidores
475
Documentos
15096
Última venta
5 horas hace
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

163 reseñas

5
87
4
21
3
25
2
6
1
24

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes