chapter-5-ethical-hacking
chapter-5-ethical-hacking
________________________is the science of testing computers and network for security vulnerabilities and
plugging the holes found before the unauthorized people get a chance to exploit them.
Ans: ethical hacking
2. _____________is identifying weakness in computer systems and/or computer networks and coming up with
countermeasures that protect the weaknesses.
Ans: ethical hacking
3. Ethical hacking is also known as
penetration testing,
Intrusion testing,
Red teaming.
4. _____________is the art of exploiting the human elements to gain access to unauthorized resources.
Ans: Social engineering
5. ___________is defined as the exploitation of the trusting nature of human beings to gain information for malicious
purposes.
Ans: Social engineering
6. A ___________is a person who finds and exploits the weakness in computer systems and/or networks to gain
access.
Ans: Hacker
7. What is the attack called “evil twin”?
Rogue access point
ARP poisoning
Session hijacking
MAC spoofing
8. What are the forms of password cracking techniques?
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
11. Which type of hacker represents the highest risk to your network?
Black-hat hackers
Grey-hat hackers
Script kiddies
Disgruntled employees
12. Hacking for a cause is called ..................
Hacktivism
Black-hat hacking
. Active hacking
Activism
13. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
Local access
Remote attack
Internal attack
Physical access
14. What port number does HTTPS use?
53
443
80
21
15. Banner grabbing is an example of what?
Footprinting
Active operating system fingerprinting
Passive operating system fingerprinting
Application analysis
16. Which of the following statements best describes a white-hat hacker?
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
17. A security audit performed on the internal network of an organization by the network administration
is also known as ___________.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
18. What is the first phase of hacking?
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
19. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
20. The security, functionality, and ease of use triangle illustrates which concept?
21. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
22. What are the three phases of a security evaluation plan? (Choose three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
A. Title 12
B. Title 18
C. Title 20
D. Title 2
25. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
A. Whois search
B. Traceroute
C. Ping sweep
D. Host scanning
28. Which of the following tools are used for footprinting? (Choose 3 answers.)
A. Whois
B. Sam Spade
C. NMAP
D. SuperScan
E. Nslookup
A. Scanning
B. Enumeration
C. System hacking
D. Active information gathering
30. Which are good sources of information about a company or its employees? (Choose all that apply.)
A. Newsgroups
B. Job postings
C. Company website
D. Press releases
Answer Options A, B, C, D.
Explanation: Newsgroups, job postings, company websites, and press releases are all good sources for
information gathering.
31. How does traceroute work?
A. It uses an ICMP destination-unreachable message to elicit the name of a router.
B. It sends a specially crafted IP packet to a router to locate the number of hops from the sender to the
destination network.
C. It uses a protocol that will be rejected by the gateway to determine the location.
D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to
the router.
32. What is footprinting?
A. Measuring the shoe size of an ethical hacker
B. Accumulation of data by gathering information on a target
C. Scanning a target network to detect operating system types
D. Mapping the physical layout of a target’s network
33. Nslookup can be used to gather information regarding which of the following?
A. Shoulder surfing
B. User identification
C. System monitoring
D. Face-to-face communication
A. A user who holds open the front door of an office for a potential hacker
B. Calling a help desk and convincing them to reset a password for a user account
C. Installing a hardware keylogger on a victim’s system to capture passwords
D. Accessing a database with a cracked password
37. Which of the following is the best example of reverse social engineering?
A. A hacker pretends to be a person of authority in order to get a user to give them information.
B. A help-desk employee pretends to be a person of authority.
C. A hacker tries to get a user to change their password.
D. A user changes their password.
38. Using pop-up windows to get a user to give out information is which type of social engineering
attack?
A. Human-based
B. Computer-based
C. Nontechnical
D. Coercive
39. What is it called when a hacker pretends to be a valid user on the system?
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
41. Faking a website for the purpose of getting a user’s password and username is which type of social
engineering attack?
A. Human-based
B. Computer-based
C. Web-based
D. User-based
42. Dumpster diving can be considered which type of social engineering attack?
A. Human-based
B. Computer-based
C. Physical access
D. Paper-based
A. 21
B. 25
C. 23
D. 80
A. 443
B. 80
C. 53
D. 21
48. What is the main problem with using only ICMP queries for scanning?
A. SYN-SYN ACK-ACK
B. SYN-ACK-FIN
C. SYN-SYNACK-ACK
D. SYN-PSH-ACK
A. Full Open
B. Syn scan
C. XMAS
D. TCP connect
52. What is the proper command to perform and NMAP SYN scan every 5 minutes?
53. In order to prevent a hacker from using SMB session hijacking, which TCP and UDP ports would
you block at the firewall?
56. Why would the network security team be concerned about ports 135–139 being open on a system?
57. Which step comes after enumerating users in the CEH hacking cycle?
A. Crack password
B. Escalate privileges
C. Scanning
D. Covering tracks
A. UsertoSID
B. Userenum
C. SID2User
D. Getacct
60. Which tool can be used to perform a DNS zone transfer on Windows?
A. nslookup
B. DNSlookup
C. whois
D. ipconfig
67. _____________ is the technique used in business organizations and firms to protect IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
View Answer
68. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
69. Before performing any penetration test, through legal procedure, which key points listed below is not
mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
70. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
71.. After performing ____________ the ethical hacker should never disclose client information to other
parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
72. __________ is the branch of cyber security that deals with morality and provides different theories and a
principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
73. ________ helps to classify arguments and situations, better understand a cyber-crime and helps to
determine appropriate actions.
a) Cyber-ethics
b) Social ethics
c) Cyber-bullying
d) Corporate behaviour
74. A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a
firm while evaluating the security postures.
a) privacy and security
b) rules and regulations
c) hacking techniques
d) ethics to talk to seniors
75. someone who maliciously breaks into systems for personal gain. Technically , these criminals are
______________. _________break into systems with malicious intent.
76. ______________involves comparing a company’s security policies to what’s actually taking place.
77.Ethical Hacker(White hat): A hacker who gains access to systems with a view to fix identified
weaknesses. They may also perform penetration testing and vulnerability assessments.
78. Cracker(Black hat): A hacker who gains aunautorized access to computer system for personal gain.
79. Gray Hat: A hacker who is in between ethical and black hat hakcers. He/She breaks into computer
systems without authority with a view to identify weaknesses and reveal them to the system owner.
80.Script Kiddies: A non-skilled person who gains access to computer systems using already made tools.
81. Hacktivist: A hacker who use hacking to send social,religious,and political etc messages. This is usually
done by hijacking websites and leaving the message on the hijacked website.
82. Phreaker: A hacker who identifies and exploits weaknesses in telephone instead of computers.
Hackers break into buildings, computer rooms or other areas containing critical information or
property.
1. Connecting into a network through a rogue modem attached to a computer behind a firewall.
2. Exploiting weakness in network transport mechanisms such as TCP/IP and NetBIOS.
3. Flooding a network with too many requests, creating a Denial of Service(DoS) for legitimate
requests.
4. Installing a network analyzer on a network and capturing every packet that travels across it.
5. Piggybacking into a network through an insecure wireless configuration.
87. List out some of the common tools used by Ethical hackers?
Meta Sploit
Wire Shark
NMAP(Network Mapper)
John The Ripper
Maltego
EtherPeek
WebInspect
LC4
Network Stumbler
ToneLoc
Internet Scanner
Ethereal
Nessus
Nikto
Kismet
THC-Scan
SATAN(Security Adminstrator Tool for Analysing Network)
88. What are the types of ethical hackers?
89. What are the types of computer based social engineering attacks? Explain what is Phishing?
Phishing
Baiting
On-line scams
Phishing technique involves sending false e-mails, chats or website to impersonate real system with aim of
stealing information from original website.
A network sniffer monitors data flowing over computer network links. By allowing you to capture and view
the packet level data on your network, sniffer tool can help you to locate network problems. Sniffers can be
used for both stealing information off a network and also for legitimate network management.
91. Explain what is Burp Suite, what are the tools it consist of?
Burp suite is an integrated platform used for attacking web applications. It consists of all the Burp tools
required for attacking an application. Burp Suite tool has same approach for attacking web applications like
framework for handling HTTP request, upstream proxies, alerting, logging and so on.
Proxy
Spider
Scanner
Intruder
Repeater
Decoder
Comparer
Sequencer
AttackBrute Forcing
AttacksHybrid
AttackSyllable
AttackRule
93. Explain what are the types of hacking stages?
Gaining AccessEscalating
PrivilegesExecuting
ApplicationsHiding
FilesCovering Tracks
If the application doesn’t sanitize the user input then the SQL injection happens. Thus a malicious hacker
would inject SQL question to gain unauthorized access and execute administration operations on the database.
SQL injections may be classified as follows:
95. What's a denial of service (DOS) attack and what are the common forms?
DOS attacks involve flooding servers, systems or networks with traffic to cause over-consumption of victim
resources. This makes it troublesome or not possible for legitimate users to access or use targeted sites.
It’s best, actually, to master all 5 of Python, C/C++, Java, Perl, and LISP. Besides being the foremost vital
hacking languages, they represent totally different approaches to programming, and each of it can educate you
in valuable ways.
A spoofing attack is when a malicious party impersonates another device or user on a network so as to launch
attacks against network hosts, steal data, unfold malware or bypass access controls. Different Spoofing attacks
are deployed by malicious parties to achieve this.