List at least five domains tested for the Certified Ethical Hacker (CEH) exam.

What will be an ideal response?

- Ethics and legal issues
- Footprinting
- Scanning
- Enumeration
- System hacking
- Trojan programs and backdoors
- Sniffers
- Denial of service
- Social engineering
- Session hijacking
- Hacking Web servers
- Web application vulnerabilities
- Web-based password-cracking techniques
- Structured Query Language (SQL) injection
- Hacking wireless networks
- Viruses and worms
- Physical security
- Hacking Linux
- Intrusion detection systems (IDSs), firewalls, and honeypots
- Buffer overflows
- Cryptography
- Penetration-testing methodologies

Computer Science & Information Technology

You might also like to view...

Discuss five rules that apply to constant variables.

What will be an ideal response?

Computer Science & Information Technology

The ___________ property of a control specifies where it gets the data it displays.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology