100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH v10 Vocabulary Test with Complete Solutions $13.49   Add to cart

Exam (elaborations)

CEH v10 Vocabulary Test with Complete Solutions

 5 views  0 purchase
  • Course
  • CEH v10 Vocabulary
  • Institution
  • CEH V10 Vocabulary

CEH v10 Vocabulary Test with Complete Solutions The five subsections of HIPPA - Answer-Electronic Transaction and Code Sets, Privacy Rule, Security Rule, National Identifier Requirements, and Enforcement The Sarbanes-Oxley (SOX) Act - Answer-created to make corporate disclosures more accurate a...

[Show more]

Preview 2 out of 9  pages

  • August 12, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CEH v10 Vocabulary
  • CEH v10 Vocabulary
avatar-seller
Scholarsstudyguide
CEH v10 Vocabulary Test with Complete
Solutions

The five subsections of HIPPA - Answer-Electronic Transaction and Code Sets, Privacy
Rule, Security Rule, National Identifier Requirements, and Enforcement

The Sarbanes-Oxley (SOX) Act - Answer-created to make corporate disclosures more
accurate and reliable in order to protect the public and investors from shady behavior.
There are 11 titles within SOX that handle everything from what financials should be
reported and what should go in them, to protecting against auditor conflicts of interest
and enforcement for accountability.

The Payment Card Industry Data Security Standard (PCI-DSS) - Answer-a security
standard for organizations handling credit cards, ATM cards, and other point-of-sales
cards. The standards apply to all groups and organizations involved in the entirety of the
payment process—from card issuers, to merchants, to those storing and transmitting
card information

What are the 12 requirements for PCI-DSS? - Answer-Install and maintain firewall
configuration to protect data.
Remove vendor-supplied default passwords and other default security features.
Protect stored data.
Encrypt transmission of cardholder data.
Install, use, and update AV (antivirus).
Develop secure systems and applications.
Use "need to know" as a guideline to restrict access to data.
Assign a unique ID to each stakeholder in the process (with computer access).
Restrict any physical access to the data.
Monitor all access to data and network resources holding, transmitting, or protecting it.
Test security procedures and systems regularly.
Create and maintain an information security policy.

COBIT - Answer-Control Objects for Information and Related Technology

ISACA - Answer-Information Systems Audit and Control Association

ITGI - Answer-T Governance Institute

Control Objects for Information and Related Technology (COBIT) was created by the
Information Systems Audit and Control Association (ISACA) and the IT Governance
Institute (ITGI). It categorizes control objectives into the what domains? - Answer-•
Planning and organization
• Acquisition and implementation

, • Delivery and support
• Monitoring and evaluation

ISO/IEC 27001:2013 - Answer-What provides requirements for creating, maintaining,
and improving organizational IS (Information Security) systems. The standard
addresses issues such as ensuring compliance with laws as well as formulating internal
security requirements and objectives.

Hack value - Answer-It is the notion among hackers that something is worth doing or is
interesting

Vulnerability - Answer-Existence of a weakness, design, or implementation error that
can lead to an unexpected event compromising the security of the system. Simply put,
vulnerability is a security loophole that allows an attacker to enter the system by
bypassing various user authentications

Exploit - Answer-A breach of IT system security through vulnerabilities. it also refers to
malicious software or commands that can cause unanticipated behavior of legitimate
software or hardware through attackers taking advantage of the vulnerabilities

Payload - Answer-Payload is the part of an exploit code that performs the intended
malicious action, such as destroying, creating backdoors, and hijacking computers.
Hackers use various methods to execute the payload. For example, they can activate a
logic bomb, execute an infected program, or use an unprotected computer connected to
a network.

authenticity - Answer-the characteristic of a communication, document or any data that
ensures the quality of being genuine

Non-repudiation - Answer-Guarantee that the sender of a message cannot later deny
having sent the message and that the recipient cannot deny having received the
message.


5 zone of ECC - Answer-Internet, Internet DMZ, Production Network Zone, Intranet
Zone, Management Network Zone

7 layers of OSI model - Answer-Application, Presentation, Session, Transport, Network,
Data Link, and Physical

four layers of the TCP/IP stack - Answer-Application, Transport, Internet, and Network
Access

TCP/IP Frame - Answer-Preamble, Start Frame Delimiter(SFD), Destination Address,
Source Address, Length/type, Data,Frame Check Sequence (FCS)

3-way Handshake - Answer-SYN, SYN/ACK, ACK

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart