Crypto is Hipto WiFi or Bluetooth only no cables needed You can't evade this category The typical junk drawer Get your head out of the clouds
100
What is a Certificate Authority
This manages digital certificates
100
What are wired networks
WEP was designed to offer security comparable to this
100
What is a HIDS
If I wanted to monitor activity on a host, I would use this
100
What is Traffic Filtering
I do this to prevent a Denial of Service attack
100
What is Software hosting
I'm using SaaS in the cloud and hosting this
200
What is Hashing
This is a kind of algorithm, a message digest if you will
200
What is a Site Survey
If I wanted to locate a wireless access point, I would do this
200
What is Port Scanning
A search engine isn't going to help identify a firewall, this would be more appropriate
200
What is UDP
Firing up Trinoo, this protocol is the goto to perform a DoS
200
What is MitM
I am called this if I can manipulate data in transit.
300
What are the number of keys
Because of this problems exist with Symmetric key distributions
300
What is Bluesnarfing
Reading information from a Bluetooth enabled device is this type of attack
300
What is Encryption
If I want to evade an IDS, i would use this
300
What is Targa
8 different types of DoS attacks are at your disposal with this tool
300
What is reduce costs
A private cloud would not be an option if you are looking for this
400
What is transmitted data
SSL is used to secure data in this state
400
What is a Honeypot
You could say this is used to attract victims to connect to it
400
What is three
At a minumum, a multi homed firewall has this many network connections
400
What is a wrapper
I'm not busting out rhymes, instead I'm combining a Trojan and a back door into a single executable
400
What is three
There are only this many cloud hosting environments
500
What is Level 3
in IPsec, encryption and other processes happen on this layer of the OSI model
500
What is WPA
Because of WPS support it's easy to defeat this wireless security standard
500
What is SNMP
I need both ports 161 and 162 to function
500
What is a worm spreads by itself but a virus must attach to another program
Virus and Worms can both be malicious however they differ in regards to this
500
What is Layer 3 and 4
If I am a cloud based solution, according to the OSI model I operate at these layers






CEH Jeopardy

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline