Ethical Hacking Interview Questions

CEH Interview Question and Answer

Ethical Hacking Interview Question

Ethical Hacking is when a person is allowed to hacks the system with the permission of the product owner to find weakness in a system and later fix them.
Footprinting refers to uncovering and collecting as much information as possible about a target network.
Scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Scanning is one of the components of intelligence gathering for an attacker to create a profile of the target organization. Scanning types :
Port Scanning
Vulnerability Scanning
Network Scanning
Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an Intranet Environment.
Simple Network Management Protocol ( SNMP ) is a TCP/IP protocol used for remote monitoring and managing hosts, routers, and other devices on a network.
MIB is a virtual database containing formal description of all the network objects that can be managed using SNMP. The MIB database is hierarchical and each managed object in a MIB is addressed through object identifiers ( OID )
The Lightweight Directory Access protocol is a protocol used to access the directory listings within Active Directory or from the other directory services.
Network Time Protocol ( NTP ) is designed to synchronize clocks of networked computers. It uses UDP port 123 as its primary means of communication. NTP can maintain time to within 10 milliseconds (1/100 seconds) over the public Internet.
Gaining Access
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Dictionary Attacks
Brute Forcing Attacks
Hybrid Attack
Syllable Attack
Rule – based Attack.
ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.
The types of hacking stages are
1. Gaining AccessEscalating
2. PrivilegesExecuting
3. ApplicationsHiding
4. FilesCovering Tracks
The types of password cracking technique includes
1. AttackBrute Forcing
2. AttacksHybrid
3. AttackSyllable
4. AttackRule
The process of extracting machine name, user names, network resources, shares and services from a system. Under Intranet environment enumeration techniques are conducted.

Call us today at +91-9650202445 or Email us at

We strive to provide Our Customers with Top Notch Support to make their Theme Experience Wonderful Contact Us

Clients and Partners