Define CEH.
Certified Ethical Hacker, a credential for professionals in ethical hacking.
What is the first phase of the CEH hacking methodology?
The first phase is Reconnaissance, where information gathering occurs.
True or false: Scanning identifies live hosts and services.
TRUE
Scanning helps in identifying vulnerabilities in the target systems.
Fill in the blank: Gaining Access involves _______ exploiting vulnerabilities.
actively
What does maintaining access mean in hacking?
It refers to creating a backdoor for future access to the system.
Define covering tracks.
The process of erasing evidence of hacking activities to avoid detection.
What is social engineering?
Manipulating individuals into divulging confidential information.
True or false: Footprinting is part of the reconnaissance phase.
TRUE
Footprinting involves gathering information about a target’s network.
What is the purpose of vulnerability assessment?
To identify and evaluate security weaknesses in a system.
Fill in the blank: Denial of Service attacks aim to _______ system availability.
disrupt
What is exploitation in hacking?
The act of taking advantage of a vulnerability to gain unauthorized access.
Define post-exploitation.
Actions taken after gaining access to maintain control over the compromised system.
What is the role of reporting in CEH?
To document findings and provide recommendations for improving security.
True or false: Network sniffing captures data packets traveling over a network.
TRUE
Sniffers can be used to intercept sensitive information.
What does password cracking involve?
Attempting to gain unauthorized access by guessing or recovering passwords.
Fill in the blank: SQL Injection is a type of _______ attack.
injection
What is malware?
Malicious software designed to harm or exploit any programmable device.
Define phishing.
A technique to trick individuals into revealing personal information via deceptive emails.
What is the purpose of firewalls?
To monitor and control incoming and outgoing network traffic based on security rules.
True or false: Encryption secures data by converting it into a readable format.
FALSE
Encryption transforms data into an unreadable format to protect it.
What is the function of intrusion detection systems (IDS)?
To monitor network traffic for suspicious activities and potential threats.
Fill in the blank: Zero-day vulnerabilities are _______ known to the vendor.
not
What is risk assessment?
The process of identifying, evaluating, and prioritizing risks to minimize impact.
Define ethical hacking.
Legally testing systems for vulnerabilities to improve security.