Misconfiguration attack - ANSWER 6. A __ is an attack that focuses on attacking the
system for vulnerabilities caused by misconfigurations affecting web servers, app.
plateforms, databases, networks, or frameworks that may lead to illegal access or
possible owning of the system.
- OS attack
- misconfiguration attack
- application-level attack
- shrink-wrap code attack
(CEHv9 Textbook Mod.01 PG.13)
shrink-wrap code attack - ANSWER 7. a(n) __ is a type of system attack where attackers
exploit default configuration and settings of the off-the-shelf libraries and code.
- OS attack
- misconfiguration attack
- application-level attack
- shrink-wrap code attack
(CEHv9 Textbook Mod.01 PG.13)
information warfare - ANSWER 8. ___ refers to the use of information and
communication tech. (ICT) to take competitive advantages over and opponent.
- information warfare
,- zero-day attack
- phishing
(CEHv9 Textbook Mod.01 PG.13)
footprinting - ANSWER 1. ___ is the first stage of ethical hacking. this is the concept of
gathering information concerning a target network and its physical surroundings.
daisy chaining
port scanning
footprinting
blue printing
(CEHv9 LAB Mod.02)
hack value - ANSWER 2. ___ is a concept among hackers that does something worth
doing or something interesting.
hack value
dare
reconnaissance
footprinting
(CEHv9 Textbook Mod.01 PG.9)
daisy chaining - ANSWER 3. ____ involves gaining access to one network and/or
computer and then using the same info. to gain access to multiple networks and
computers that contain desirable information.
- daisy chaining
- reconnaissance
- port scanning
- footprinting
, (CEHv9 Textbook Mod.01 PG.9)
doxing - ANSWER 4. ___ is the act of publishing personally ID'able info. about an
individual collected from publicly available databases and social media.
- daisy chaining
- reconnaissance
- port scanning
- footprinting
(CEHv9 Textbook Mod.01 PG.9)
OS attack - ANSWER 5. a(n) __ is a kind of system attack whereby attackers look for
flaws in an OS design, install or config and then exploit such flaw to *gain access to a
system*.
OS attack
misconfiguration attack
application-level attack
shrink-wrap code attack
(CEHv9 Textbook Mod.01 PG.13)
black hats - ANSWER 9. ___ are hackers who use their computing skills for malicious or
destructive activities (aka crackers).
- black hats
- white hates
- gray hats
- suicide hackers
- cyber terrorists
- state sponsored hackers
- hacktivists
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Braxton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.