CEH v11 Questions and Answers | Latest
Update | 2024/2025 | 100% Pass
What is the primary goal of ethical hacking?
The primary goal of ethical hacking is to identify vulnerabilities in systems and networks to
enhance security before malicious attackers can exploit them.
What are the pha...
CEH v11 Questions and Answers | Latest
Update | 2024/2025 | 100% Pass
What is the primary goal of ethical hacking?
✔✔ The primary goal of ethical hacking is to identify vulnerabilities in systems and networks to
enhance security before malicious attackers can exploit them.
What are the phases of a penetration test?
✔✔ The phases include planning, reconnaissance, scanning, gaining access, maintaining access,
and analysis.
What is the difference between vulnerability assessment and penetration testing?
✔✔ Vulnerability assessment identifies and prioritizes vulnerabilities, while penetration testing
actively exploits those vulnerabilities to determine the level of risk.
What is the purpose of footprinting in ethical hacking?
✔✔ Footprinting is the process of gathering information about a target system to understand its
architecture and potential vulnerabilities.
1
,What is a DNS zone transfer?
✔✔ A DNS zone transfer is a method of replicating DNS databases across DNS servers, which
can be exploited to gain information about domain names and IP addresses.
What is a brute force attack?
✔✔ A brute force attack is a method used to guess passwords or encryption keys by
systematically trying all possible combinations until the correct one is found.
What role does social engineering play in cybersecurity?
✔✔ Social engineering manipulates individuals into divulging confidential information, often
bypassing technical security measures.
What is SQL injection, and how can it be prevented?
✔✔ SQL injection is an attack that allows an attacker to execute arbitrary SQL code on a
database. It can be prevented by using prepared statements and input validation.
What are some common types of malware?
✔✔ Common types of malware include viruses, worms, trojans, ransomware, and spyware.
2
,What is the significance of using strong passwords?
✔✔ Strong passwords enhance security by making it more difficult for attackers to guess or
crack them, reducing the risk of unauthorized access.
What is the function of a firewall?
✔✔ A firewall monitors and controls incoming and outgoing network traffic based on
predetermined security rules.
What is cross-site scripting (XSS)?
✔✔ Cross-site scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts
into web pages viewed by users.
What is the difference between a white hat hacker and a black hat hacker?
✔✔ A white hat hacker conducts ethical hacking to improve security, while a black hat hacker
exploits vulnerabilities for malicious purposes.
What is the purpose of encryption?
✔✔ Encryption protects sensitive data by converting it into an unreadable format that can only
be reverted to its original form with the correct key.
3
, What is a zero-day vulnerability?
✔✔ A zero-day vulnerability is a security flaw that is unknown to the vendor and has not yet
been patched, making it particularly dangerous.
How can an organization mitigate the risk of phishing attacks?
✔✔ Organizations can mitigate phishing risks by providing employee training, implementing
email filtering, and using multi-factor authentication.
What is the CIA triad in cybersecurity?
✔✔ The CIA triad refers to the principles of Confidentiality, Integrity, and Availability, which
are fundamental to information security.
What tools are commonly used for network scanning?
✔✔ Common tools include Nmap, Nessus, and Wireshark, which help identify active devices
and their open ports on a network.
What is the purpose of a security policy?
4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SterlingScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R222,72. You're not tied to anything after your purchase.