List at least five domains tested for the Certified Ethical Hacker (CEH) exam.
What will be an ideal response?
- Ethics and legal issues
- Footprinting
- Scanning
- Enumeration
- System hacking
- Trojan programs and backdoors
- Sniffers
- Denial of service
- Social engineering
- Session hijacking
- Hacking Web servers
- Web application vulnerabilities
- Web-based password-cracking techniques
- Structured Query Language (SQL) injection
- Hacking wireless networks
- Viruses and worms
- Physical security
- Hacking Linux
- Intrusion detection systems (IDSs), firewalls, and honeypots
- Buffer overflows
- Cryptography
- Penetration-testing methodologies
You might also like to view...
Which of the following may a router or host use as a way to indicate that it is becoming congested or overloaded?
A. Checksum B. Source Quench C. GMT D. PMTU
Text set in all uppercase letters can be difficult to read.
Answer the following statement true (T) or false (F)
The feature that displays table column headings at the top of each page is
A. Page Header B. Repeat Header Rows C. Distribute Rows D. Distribute Columns
?The selector _____ identifies the color to apply to a navigation link that has been clicked.
A. ?nav a:link B. ?nav a:active C. ?nav a:hover D. ?nav a:visited