List at least five domains tested for the Certified Ethical Hacker (CEH) exam.

What will be an ideal response?


- Ethics and legal issues
- Footprinting
- Scanning
- Enumeration
- System hacking
- Trojan programs and backdoors
- Sniffers
- Denial of service
- Social engineering
- Session hijacking
- Hacking Web servers
- Web application vulnerabilities
- Web-based password-cracking techniques
- Structured Query Language (SQL) injection
- Hacking wireless networks
- Viruses and worms
- Physical security
- Hacking Linux
- Intrusion detection systems (IDSs), firewalls, and honeypots
- Buffer overflows
- Cryptography
- Penetration-testing methodologies

Computer Science & Information Technology

You might also like to view...

Which of the following may a router or host use as a way to indicate that it is becoming congested or overloaded?

A. Checksum B. Source Quench C. GMT D. PMTU

Computer Science & Information Technology

Text set in all uppercase letters can be difficult to read.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The feature that displays table column headings at the top of each page is

A. Page Header B. Repeat Header Rows C. Distribute Rows D. Distribute Columns

Computer Science & Information Technology

?The selector _____ identifies the color to apply to a navigation link that has been clicked.

A. ?nav a:link B. ?nav a:active C. ?nav a:hover D. ?nav a:visited

Computer Science & Information Technology