100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CEH v11 Exam

Beoordeling
-
Verkocht
-
Pagina's
131
Cijfer
A+
Geüpload op
28-06-2022
Geschreven in
2021/2022

CEH v11 Exam Authentication - The process of identifying a user's identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above. Botnet - A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches. DDoS - Using multiple hosts and users, hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to temporarily shut down. Domain - A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity. Encryption - Coding used to protect your information from hackers. Malware - malicious software that damages or disables computer systems and gives limited or full control of the systems to the creator for malicious activities such as theft or fraud. Spoofing - When a hacker changes the IP address of an email so that it seems to come from a trusted source Spyware - A type of malware that attackers install on a computer to secretly gather information about its users without their knowledge. Trojan Horse - A form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer. Virus - It infects a system by inserting itself into a file or executable program. Malware which changes, corrupts, or destroys information, and is then passed on to other systems, usually by otherwise benign means. VPN - creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information. It creates a subnet by using key-based encryption for secure communication between endpoints. Worm - Malware that can reproduce itself for the purposes of spreading itself to other computers in the network. Hack Value - The notion among hackers that something is worth doing or is interesting. Vulnerability - An existence of a weakness, design, or implementation error that may lead to compromising the security of the system. Exploit - A breach of IT system security through vulnerabilities. It is the part the malware that contains code or a sequence of commands that can take advantage of a bug or vulnerability in a digital system or device. Payload - Payload Daisy Chaining - Gaining access to one network and/or computer to obtain information that will enable them to gain access to multiple other computers and/or networks. Doxing - Publishing personally identifiable information about an individual that was obtain from public databases and social media. Bot - A software application that can be remotely controlled to execute/automate predefined tasks. Information Security - A state of infrastructure and information well-being to keep the possibility of theft, tampering, disruption of information and services kept tolerable and low. Confidentiality - The assurance that information is only accessible to authorized individuals. Integrity - The trustworthiness of preventing improper and unauthorized changes of data or resources. Availability - The assurance that the system which is responsible for the processing, delivering and storing of information is accessible to the authorized users when required. Authenticity - Any data, communication or document characteristics which ensures the quality of being genuine. Non-Repudiation - Guarantees that an individual cannot later deny sending a message and the recipient cannot deny receiving a message. Cloud Computing - An on-demand delivery of IT capabilities where infrastructure and applications are provided to subscribers as a metered service over a network. Advanced Persistent Threats (APT) - An attack vector focuses on stealing data from a victims machine without their knowledge. Cloud Computing Threats - An attack vector is a flaw in within a client's application cloud which can enable attackers to access other client's data. Insider Attacks - An attack is performed on a network or single computer by an entrusted individual who has authorized access. Web Application Threats - A security attack vector that threatens the performance of a website and hampers its security to steal user credentials, set up a phishing site or acquire private data by targeting web applications. SHA-1 - A Secure Hashing Algorithm (SHA) that produces a 160-bit digest from a message with a maximum length of (264 - 1) bits, and resembles the MD5 algorithm. Software as a Service (SaaS) - Offers software to subscribers on-demand over the internet. Platform as a Service (PaaS) - Offers development tools, configuration management, and deployment platforms on-demand that can be used by subscribers to develop custom applications. Infrastructure as a Service (IaaS) - Provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service API. Identify as a Service (IDaaS) - Offers IAM services including SSO, MFA, IGA and intelligence collection. Security as a Service (SECaaS) - Provides Penetration testing, authentication, intrusion detection, anti-malware, security incident, and event management services. Container as a Service (CaaS) - Offers Virtualization of container engines, management of containers, applications and clusters through a web portal or API. Function as a Service (FaaS) - Provides a platform for developing, running and managing application functionality for microservices. Public Cloud - Services are rendered over a network that is open for public use. Private Cloud - Cloud infrastructure is operated for a single organization only. Community Cloud - Shared Infrastructure between several organizations from a specific community with common concerns. Hybrid Cloud - Combination of two or more clouds that remain unique entities but are bound together, thereby offering the benefits of multiple deployment models. Multi Cloud - Dynamic heterogeneous environment that combines workloads across multiple cloud vendors, managed via one proprietary interface to achieve long term business goals. Cloud Consumer - A person or organization that uses cloud computing services. Cloud Provider - A person or organization that provides services to the interested parties. Cloud Carrier - Providing connectivity and transport services between cloud consumers and providers. Cloud Auditor - A party that can conduct independent assessment of cloud service controls and taking an opinion thereon. Cloud Broker - An entity that manages the use, performance and delivery of cloud services, and maintains relationships between cloud providers and consumers. Virtualization - The ability to run multiple operating systems on a single physical system. or multiple instances of one operating system and share the underlining resources such as a server, storage device or network. Containers - Placed on the top of one physical server and host operating system, and share the operating systems kernel binaries and libraries, thereby reducing the need for reproducing the OS. Docker - An open source technology used for developing, packaging and running applications and all its dependencies in the form of containers, to ensure that the application works in a seamless environment. It provides a PaaS through OS level virtualization and delivers containerized software packages. Kubernetes - An open source, portable, extensible, orchestration platform developed by Google for managing containerized applications and microservices. It provides a resilient framework for managing distributed containers, generating deployment patterns, and performing failover and redundancy for the applications. Network Sniffing - Interception and monitoring of network traffic which is being sent between the two cloud nodes. Packet Sniffers - Programs that capture data from information packets as they travel over the Internet or company networks. Captured data is sifted to find confidential or proprietary information. Side Channel Attack - An attack where an attacker runs a virtual machine on the same physical host as the victims virtual machine and takes advantage of the shared physical resources (processor cache) to steal data ( cryptographic keys) from the victim.

Meer zien Lees minder
Instelling
CEH V11
Vak
CEH v11











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CEH v11
Vak
CEH v11

Documentinformatie

Geüpload op
28 juni 2022
Aantal pagina's
131
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€11,75
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
ErnestMichael

Maak kennis met de verkoper

Seller avatar
ErnestMichael Yale University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
3 jaar
Aantal volgers
0
Documenten
29
Laatst verkocht
-
ERNESTMICHAEL\'S LIBRARY

NEED HELP IN YOUR STUDIES? NO PROBLEM. I AM HERE TO ASSIST YOU DO YOUR STUDIES AND RESEARCH WITHOUT MUCH HUSTLE. WELCOME

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen