CEH
Chapter 4: Footprinting and Reconnaissance 419 A. Hashing is intended to verify and preserve the integrity of data, but it cann ...
420 Appendix A ■ Answers to Review Questions A. System hacking is concerned with several items, including exploiting services o ...
Chapter 5: Scanning Networks 421 Chapter 5: Scanning Networks A. Telnet is used to perform banner grabs against a system. Howev ...
422 Appendix A ■ Answers to Review Questions D. A banner can be changed on many services keeping them from being easily identif ...
Chapter 7: Gaining Access to a System 423 Chapter 7: Gaining Access to a System A, D. Usernames are especially useful in the sy ...
424 Appendix A ■ Answers to Review Questions Chapter 8: Trojans, Viruses, Worms, and Covert Channels C. Malware covers all type ...
Chapter 9: Sniffers 425 C. A polymorphic virus evades detection through rewriting itself. C. A sparse infector evades detection ...
426 Appendix A ■ Answers to Review Questions A. Wireshark filters use the basic syntax of putting the protocol first followed b ...
Chapter 11: Denial of Service 427 A. Appearance can easily impact the opinion that an individual or a group has about some- one ...
428 Appendix A ■ Answers to Review Questions D. Throttling network traffic will slow down a potential DoS attack; however, an i ...
Chapter 12: Session Hijacking 429 C. Although any of these options could be symptomatic of a DoS attack, the most common is slo ...
430 Appendix A ■ Answers to Review Questions A. Web applications can be vulnerable to session fixation if the right conditions ...
Chapter 14: SQL Injection 431 C. Access control lists (ACLs) are used to set permissions on web content and prevent or control ...
432 Appendix A ■ Answers to Review Questions B. Firewalls can prevent the scanning of systems and the probing or discovery of a ...
Chapter 15: Wireless Networking 433 Chapter 15: Wireless Networking B. WEP is intended to offer security comparable to that exp ...
434 Appendix A ■ Answers to Review Questions C. Warchalking is used specifically to draw others’ attention to the presence of a ...
Chapter 17: Physical Security 435 A. Signature files are used by IDS systems to match traffic against known attacks to deter- m ...
436 Appendix A ■ Answers to Review Questions D. Mantraps are intended to control access and thus stop the occurrence of physica ...
About the Additional Study Tools Appendix B bapp02.indd 437 22-07-2014 10:58:09 ...
438 Appendix B ■ About the Additional Study Tools In this appendix: ■ Additional Study Tools ■ System requirements ■ Using the S ...
«
17
18
19
20
21
22
23
24
25
26
»
Free download pdf