CEH Interview Q&A Vol 1.0

Categories: ,


CEH Interview  Q&A Vol 1.0

Questions 50

Check the complete list of questions:

  1. What is phishing?
  2. Which attack method can be used to compromise the system in a way to allow later remote access?
  3. What is a captcha?
  4. What is the purpose of a Denial of Service attack?
  5. Which key is used to decrypt the message in PKI?
  6. Why is PGP used for?
  7. What are the types of hackers based on their motive and legality of actions?
  8. What are the types of scanning?
  9. Explain MAC address spoofing?
  10. Explain what is brute force attack and which tool can be used for this attack?
  11. What is the most common form of DoS attack?
  12. How you can prevent against Cross Site Request Forgery (CSRF) attack?
  13. What is IPsec and why is it used for?
  14. How to avoid Man-in-the-middle attacks?
  15. Define ransomware and explain countermeasure for protection?
  16. According to OWASP top 10 security risks what is the most dangerous web vulnerability?
  17. What is footprinting?
  18. What is a sniffing attack?
  19. What is the difference between passive and active reconnaissance?
  20. What is enumeration?
  21. What is the difference between asymmetric and symmetric encryption?
  22. What is a firewall?
  23. What is the difference between worm and virus?
  24. What is Keylogger and Keylogger Trojan?
  25. What is NULL Scan?
  26. Explain Black box testing?
  27. What is TCP SYN message in three-way handshake?
  28. What is Open-source intelligence (OSINT)?
  29. What is Maltego?
  30. What is Snort?
  31. What is the difference between hashing and encryption?
  32. Explain cyber kill chain process?
  33. Explain DNS spoofing?
  34. What is hash collision attack in cryptography?
  35. What are WPA and WPA2?
  36. What is Kismet?
  37. Write OpenSSL command that will check TLS/SSL of website named test.com openssl s_client -connect www.test.com:443
  38. Explain buffer overflow?
  39. How many antivirus programs should be installed on a single system at the same time?
  40. User wants to send secret message by hiding it within jpeg image. What technique is used in this scenario?
  41. Hacker sends a legitimate looking email message asking users to update their information on the company’s website. URL in the email point to a false website. What technique is used in this scenario?
  42. Assume that website testwebsite.com may contain sensitive information about username and passwords in pdf files. What query input will help you to search that files using Google as a search engine?
  43. What is the purpose of a DMZ on a network?
  44. User with computer IP address fails to access web server at IP address You decide to run wireshark in client computer to check if the messages are going to the web server. What wireshark filter will show the connections from the client computer to web server?
  45. Administrator needs to permit http traffic in the host and UDP traffic in the host He also needs to permit all HTTPS traffic to the rest of the network and deny all other traffic. What should be changed in following configuration in order to achieve this?
  46. Explain SQL injection attack and which method can be used to reduce the risk of falling victim to a SQL injection attack?
  47. A network administrator realized that some users are connecting their notebooks in the wired network to have Internet access. What should be done in order to prevent unauthorized access to wired network?
  48. Which nmap scan does not completely open a TCP connection?
  49. Explain nmap -T0 option and when you would use it?
  50. Write nmap command that will execute http and https port scan for all hosts that belong network except host


There are no reviews yet.

Be the first to review “CEH”

Select your currency
USD United States (US) dollar