1. A. CEH methodology is laid out this way: reconnaissance (footprinting), scanning and enumeration, gaining access, escalating privileges, maintaining access, and covering tracks.
B, C, and D are incorrect. These answers have the methodology in incorrect order.
2. C. The security element of availability, obviously, is all about maintaining the availability of the resource to authorized individuals.
A, B, and D are incorrect. Confidentiality keeps the wrong eyes from seeing the data, and integrity ensures message data is not changed. Authentication is a distracter.
3. C. Using the Security, Functionality, and Ease of Use triangle, if you move from the middle of the triangle to any of the points, you are moving away ...