• About Us
  • All Categories
  • Contact
  • Home
  • Our Authors
  • Global Knowledge Blog Global Knowledge Blog

--

  • Home
  • All Categories
  • Our Authors
  • About Us
  • Global Knowledge Blog
  • Home
  • All Categories
  • Our Authors
  • About Us

CEH

CEH
  • Home
  • CEH
  • CEH

    DoS, DDos and DeOS… Oh My!!

    In the security industry, we classify our security infrastructure in a variety of ways. One important classification method is called the “CIA Triad,” which refers to three security objectives defined by the Federal Information Security...

    By Daniel Cummins October 19, 2017
  • CEH

    CEH v9 Question of the Week: Password Attack Method

    Kelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she...

    By Guest Authors August 10, 2016
  • CEH

    CEH v9 Question of the Week: Social Engineering Attack

    Kevin, an IT security consultant, is working on contract for Davidson Avionics to audit the company's network. He is given permission to perform any necessary tests. Kevin creates a fake company ID badge and uniform...

    By Guest Authors August 3, 2016
  • CEH

    CEH v9 Question of the Week: Password Cracking Tool

    Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense’s front end Exchange Server. He was able to get into the server, located in a...

    By Guest Authors July 27, 2016
  • CEH

    CEH v9 Question of the Week: Full TCP connection

    Which type of scan opens a full TCP connection?

    By Guest Authors July 6, 2016
  • CEH

    CEH v9 Question of the Week: Firewall Traffic

    Jason asked his company’s firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why is this request...

    By Guest Authors June 29, 2016
  • CEH

    CEH v9 Question of the Week: TCP/IP Session Hijacking

    TCP/IP session hijacking is carried out in which OSI layer?

    By Guest Authors June 22, 2016
  • CEH

    CEH v9 Question of the Week: Sniff a Switched Network

    Martin, a network security auditor, is aware that his company uses a switched network, which cannot be sniffed by some programs without some tweaking. What technique could he use to sniff his agency’s switched network?

    By Guest Authors June 15, 2016
  • CEH

    CEH v9 Question of the Week: XSS Scripting

    Which of the following is a countermeasure against XSS scripting?

    By Guest Authors June 8, 2016
  • CEH

    CEH v9 Question of the Week: Same MAC Address

    Paul has just finished setting up his wireless network and has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on his wireless router. Paul notices that...

    By Guest Authors June 1, 2016
1 2 … 4

CONNECT WITH US

CATEGORIES

Back to top

© 2018 Global Knowledge Training LLC. All Rights Reserved.  Site Admin | Logout