CEH Exam Practice Questions Module 1
| Latest Update | 2024/2025 | Already
Passed
What is the first step in ethical hacking?
The first step in ethical hacking is reconnaissance, where information about the target
system is gathered.
How does active reconnaissance differ from passive re...
CEH Exam Practice Questions Module 1
| Latest Update | 2024/2025 | Already
Passed
What is the first step in ethical hacking?
✔✔ The first step in ethical hacking is reconnaissance, where information about the target
system is gathered.
How does active reconnaissance differ from passive reconnaissance?
✔✔ Active reconnaissance involves interacting directly with the target system, while passive
reconnaissance gathers information without direct interaction.
What tool is commonly used for network discovery?
✔✔ Nmap is commonly used for network discovery and scanning.
What is the purpose of footprinting?
✔✔ Footprinting aims to gather as much information as possible about a target system or
network before launching an attack.
1
,What is open-source intelligence (OSINT)?
✔✔ OSINT is information collected from publicly available sources to aid in the reconnaissance
phase of ethical hacking.
What is the role of scanning in ethical hacking?
✔✔ Scanning identifies open ports, services, and potential vulnerabilities in a target system.
How can social engineering attacks be prevented?
✔✔ Social engineering attacks can be prevented through user education, strong policies, and
multi-factor authentication.
What is enumeration in ethical hacking?
✔✔ Enumeration is the process of extracting more detailed information about a target, such as
user accounts, shares, and services.
What is a port scan?
✔✔ A port scan checks for open ports on a network or system to determine which services are
active.
2
, What is a vulnerability scanner?
✔✔ A vulnerability scanner is a tool used to identify security weaknesses in a network or
system.
How does a brute-force attack work?
✔✔ A brute-force attack systematically tries different combinations of credentials until the
correct one is found.
What is a man-in-the-middle (MITM) attack?
✔✔ A man-in-the-middle attack occurs when an attacker intercepts communication between two
parties to steal or alter data.
What is the purpose of using a proxy in ethical hacking?
✔✔ A proxy is used to hide the hacker’s identity by routing traffic through a different IP
address.
What is banner grabbing?
✔✔ Banner grabbing is a technique used to gather information about a system's services by
retrieving the banner message from open ports.
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SterlingScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R174,86. You're not tied to anything after your purchase.