CEH v10. Questions and Answers |
Latest Version | 2024/2025 | Already
Passed
What is the purpose of the reconnaissance phase in ethical hacking?
✔✔ The reconnaissance phase is designed to gather as much information as possible about a
target to identify potential attack vectors.
What technique is commonly used to obtain sensitive information from a user by impersonating
a legitimate source?
✔✔ Phishing is commonly used to obtain sensitive information by tricking users into providing
it under false pretenses.
What is the significance of a digital signature in cybersecurity?
✔✔ A digital signature verifies the authenticity and integrity of a message or document, ensuring
it hasn’t been altered during transmission.
How do ethical hackers ensure that their testing does not disrupt services?
1
,✔✔ Ethical hackers typically conduct tests during off-peak hours and follow a predefined scope
of work to minimize disruption.
What is a common method for attackers to exploit weak passwords?
✔✔ Attackers often use password cracking tools to perform brute-force attacks or dictionary
attacks on weak passwords.
What is the purpose of a vulnerability scanner?
✔✔ A vulnerability scanner identifies potential weaknesses in systems and networks to help
organizations address security issues before exploitation occurs.
What does "pivoting" mean in the context of an attack?
✔✔ Pivoting refers to the technique of using a compromised system to launch further attacks on
other systems within the network.
What type of attack involves manipulating a website's URL to execute unwanted commands?
✔✔ Cross-site scripting (XSS) is an attack that involves injecting malicious scripts into web
pages viewed by users.
2
,How does the concept of "defense in depth" enhance security?
✔✔ Defense in depth involves implementing multiple layers of security controls to protect
assets, ensuring that if one layer fails, others remain effective.
What is the main goal of using a password manager?
✔✔ A password manager securely stores and generates complex passwords, reducing the risk of
password reuse and increasing overall security.
What role does encryption play in protecting data?
✔✔ Encryption transforms data into an unreadable format, ensuring that only authorized parties
with the decryption key can access the original information.
How can network segmentation improve security?
✔✔ Network segmentation limits access to sensitive data and systems by dividing a network into
smaller, controlled segments, reducing the attack surface.
What is a potential consequence of failing to properly secure an API?
✔✔ Failing to secure an API can lead to unauthorized access, data breaches, and exploitation of
vulnerabilities in connected applications.
3
, What is the significance of a security information and event management (SIEM) system?
✔✔ A SIEM system aggregates and analyzes security data from across an organization,
providing real-time insights and alerts for potential threats.
What does the term "malware analysis" involve?
✔✔ Malware analysis involves examining malicious software to understand its behavior,
capabilities, and potential impact on systems.
What is a common technique used to evade intrusion detection systems (IDS)?
✔✔ Attackers may use encryption or obfuscation techniques to disguise malicious payloads and
evade detection by IDS.
What is the role of a web application penetration test?
✔✔ A web application penetration test evaluates the security of web applications by simulating
attacks to identify vulnerabilities and recommend fixes.
What is the purpose of an exploit kit?
4