(CEH) Practice Questions | Latest
Update | 2024/2025 | 100% Verified
What is a common goal of ethical hacking?
✔✔ The goal of ethical hacking is to identify and fix vulnerabilities before malicious hackers
can exploit them.
What does a buffer overflow attack involve?
✔✔ A buffer overflow attack occurs when more data is written to a buffer than it can handle,
causing the system to crash or allow the attacker to execute arbitrary code.
How do firewalls protect a network?
✔✔ Firewalls monitor and control incoming and outgoing network traffic based on
predetermined security rules.
What is the purpose of port scanning?
✔✔ Port scanning is used to identify open ports and services on a target system, which can
reveal potential vulnerabilities.
1
, What is enumeration in the context of ethical hacking?
✔✔ Enumeration is the process of extracting information about users, network resources, and
shares from a system to discover potential attack points.
What is a key function of a proxy server?
✔✔ A proxy server acts as an intermediary between a user and the internet, helping to improve
security, performance, and anonymity.
How does SQL injection work?
✔✔ SQL injection works by injecting malicious SQL queries into input fields to manipulate a
database and extract sensitive data.
What is the significance of a man-in-the-middle (MitM) attack?
✔✔ In a man-in-the-middle attack, an attacker intercepts and possibly alters the communication
between two parties without their knowledge.
What is the purpose of using a hashing algorithm in security?
✔✔ A hashing algorithm is used to create a fixed-size output (hash) from input data, ensuring
data integrity by detecting changes or tampering.
2