Certified Ethical Hacker (CEH V12) Training Intermediate-Level Questions
1. What is Ethical Hacking?
Ethical hacking involves legally breaking into computers and devices to test an organization's defenses. It's also known as penetration testing or white-hat hacking, where the hacker has permission to probe for vulnerabilities.
2. What is the primary goal of an ethical hacker?
The primary goal is to identify and fix vulnerabilities within a system before malicious hackers can exploit them, ensuring the system's security and integrity.
3. Can you name some common types of cyberattacks?
Phishing, SQL Injection, Cross-Site Scripting (XSS), Denial of Service (DoS)/Distributed Denial of Service (DDoS) attacks, and Man-in-the-Middle (MitM) attacks are common cyber threats.
4. What is a VPN, and why is it important for security?
A Virtual Private Network (VPN) extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network. It's crucial for enhancing online privacy and protecting sensitive data.
5. What are the phases of ethical hacking?
The five phases include Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks.
6. What is social engineering? Give an example.
Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. Phishing emails that trick users into revealing passwords are a common example.
7. Explain the difference between IDS and IPS.
An Intrusion Detection System (IDS) monitors network traffic for suspicious activity and issues alerts when such activity is detected, whereas an Intrusion Prevention System (IPS) actively blocks potentially harmful activity.
8. What is a firewall?
A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
9. Describe what 'footprinting' is in ethical hacking.
Footprinting is the first phase of ethical hacking, where the hacker collects as much information as possible about the target system, including domain names, IP addresses, and network information.
10. What is the difference between encryption and hashing?
Encryption is a reversible process used to transform data into a secure format for transmission, which can then be reversed into its original format. Hashing, however, is a one-way function that converts data into a fixed-size string of characters, which is not meant to be reversed.
11. What are honeypots?
Honeypots are decoy systems or servers designed to lure hackers away from the actual network resources and study their techniques.
12. What is SQL Injection?
SQL Injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It allows attackers to execute malicious SQL statements that control a web application’s database server.
13. Explain Cross-Site Scripting (XSS).
XSS is a vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites, potentially compromising the confidentiality, integrity, and availability of the data.
14. What is a Denial of Service (DoS) attack?
A DoS attack aims to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
15. What are the key differences between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, making it faster but less secure for certain applications. Asymmetric encryption uses a pair of public and private keys, enhancing security but being slower in comparison.
16. What does 'penetration testing' involve?
Penetration testing involves simulating cyberattacks against your computer system to check for exploitable vulnerabilities, in terms of security holes, weaknesses, or software bugs.
17. What is a 'false positive' in the context of security?
A false positive occurs when a security system or software mistakenly identifies a legitimate action as malicious, potentially leading to unnecessary or incorrect actions.
18. What are digital certificates?
Digital certificates are electronic "passwords" that allow individuals and organizations to engage in secure communication over the internet, verifying the party's identity with whom they are communicating.
19. What is a 'session hijacking' attack?
Session hijacking, also known as token hijacking, involves the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.
20. What is the difference between active and passive reconnaissance?
Active reconnaissance involves directly interacting with the target to gather information (e.g., scanning ports). In contrast, passive reconnaissance involves collecting information without directly interacting with the target, such as through public records or social media.