Home
Flashcards
Preview
CEH 76-100.txt
Home
Get App
Take Quiz
Create
You want to e-shoplift on a website. Which field do you change
Hidden field
What type of testing can you conduct if you are given only a company name
Black-box testing
Tripwire is an example of what
System integrity verifier
What is DNS poisoning
DNS poisoning refers to the host receiving an incorrect IP address for a requested domain name.
Melissa is an example of what type of virus
Macro
Which database do Slammer worms target
Microsoft SQL Server
What is the reason for the increase in hacking attempts
Tools are easier to use and more prolific.
What encryption key is used for shared key authentication
WEP
What makes WEP crackable
Implementation of weak IVs
What is a covert channel
A communication channel that is used in a way it was not intended to be used
If an Nmap scan is unsuccessful
what is the next step
What does a TCP FIN flag do
Closes a connection
What does a TCP SYN flag do
Requests that a connection be opened
What is Tripwire
A system integrity verifier
What does the traceroute program use to map a network path
Time to live (TTL)
What is a vulnerability
A flaw in a system or code
What is an exploit
A breach of security that takes advantage of a vulnerability in a system or code
What is a threat
A situation that could cause a breach of security
What is firewalking
Testing firewall rules
What is a bastion host
A system fully exposed to attack
What is a white hat
Someone who hacks for offensive purposes
What is a gray hat
Someone who works for offensive or defensive purposes
What type of keylogger cannot be detected by a virus scan or antispyware software
Hardware keylogger
What is phishing
Using an email message to trick someone into giving out confidential information
What type of attack does challenge/response authentication protect against
Replay attack
Author
FDNY366
ID
262685
Card Set
CEH 76-100.txt
Description
ceh quiz
Updated
2014-02-19T01:31:20Z
Show Answers
Home
Flashcards
Preview