0% found this document useful (0 votes)
20 views10 pages

Ethical Hacking Exam Prep

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

Ethical Hacking Exam Prep

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SRM VALLIAMMAI ENGINEERING COLLEGE

SRM Nagar, Kattankulathur– 603203

DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK

VII SEMESTER

Regulation–2019

Academic Year 2022–23

Prepared by
Mr.Suma.S, Assistant Professor/CSE
SRM VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur– 603203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
SUBJECT : 1904711 ETHICAL HACKING
SEM / YEAR: VII / IV

UNIT I - ETHICAL HACKING OVERVIEW & VULNERABILITIES


Understanding the importance of security, Concept of ethical hacking and essential Terminologies
Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit. Phases involved in hacking.

PART A
Q.No Questions BT Level Competence
1. Define Ethical hacking. BTL1 Remember
2. Tabulate the Vulnerabilities. BTL1 Remember
3. Differentiate Threat and Attack. BTL2 Understand
4. List out the importance of security. BTL1 Remember
5. Point out the purpose of hacking. BTL4 Analyze
6. Give the types of Hacking Technologies. BTL2 Understand
7. What is Exploit in hacking? BTL1 Remember
8. List out the various groups in hackers. BTL1 Remember
9. Point out the tasks performed by an ethical hacker. BTL4 Analyze
10. Define a hacker. BTL1 Remember
11. Illustrate penetration test process. BTL3 Apply
12. Classify the various aspects of hacking. BTL4 Analyze
13. Distinguish hacking with ethical hacking. BTL2 Understand
14. Give the activities during the phase of the attacks. BTL2 Understand
15. Show the importance of white hats in hacking. BTL3 Apply
16. Classify the essential Terminologies involved in hacking. BTL3 Apply
17. Compose a role which is played by zombie system. BTL6 Create
18. Assess why ethical hacking is allowed. Justify your answer. BTL5 Evaluate
19. Develop Target of Evaluation strategy. BTL6 Create
20. Formulate the phases involved in hacking. BTL5 Evaluate
21 Discuss types of testing on the system. BTL2 Understand
22 Intrepret the most common entry points for an attack. BTL3 Apply
23 Analyze the tools that a hacker may employ during the scanning phase. BTL4 Analyze
24 Assess the Passive and Active Reconnaissance methods. BTL5 Evaluate

PART – B
1. (i)Analyze the various types of hacker classes. (7) BTL4 Analyze
(ii)Explain in detail about ethical Hacking. (6)
2. Describe in detail the different phases involved in Ethical Hacking. (13) BTL2 Understand
3. (i)Compare and contrast white hats and black hats. (7) BTL4 Analyze
(ii)Analyze the skills required for an ethical Hacker. (6)
4. (i)Demonstrate the Purpose of Ethical Hacking. (7) BTL3 Apply
(ii) Demonstrate the role of white hats. (6)
5. (i)How do gray hats act under various situations? Justify your Statement. (7) BTL1 Remember
(ii)Identify the use of pen test in hacking. (6)
6. Explain the Ethical Hacking Terminology with suitable examples. (13) BTL1 Remember
7. Differentiate between hats involved in hacking. (13) BTL2 Understand
8. (i)Classify the groups involved in hacking. (7) BTL3 Apply
(ii)Examine how the goals attackers try to achieve security breach. (6)
9. Generalize the Ethical Hacking Terminology (13) BTL6 Create
10. (i) Examine the characteristics Ethical Hacker’s Skill Set. (7) BTL1 Remember
(ii) Describe Sniffing the network. (6)
11. Explain the different types of hacking technologies in detail. (13) BTL4 Analyze
12. Discuss: (7) BTL2 Understand
(i) Vulnerability research (6)
(ii) Hacktivism
13. (i)Describe the role of Port scanners. (7)
(7) BTL1 Remember
(ii) Identify the role Internet Control Message Protocol (ICMP) scanners. (6)
(6)
14. Summarize the issues involved in ethical hacking. (13) BTL5 Evaluate
15. List the five stages of ethical hacking. (13) BTL5 Evaluate

16. Describe the ways of conducting ethical hacking. (13) BTL2 Understand
17. Interpret the legal implications of hacking (13) BTL3 Apply
PART –C
1. Do you agree with the following statement: “White-hat hackers are “good” guys (15) BTL5 Evaluate
who use their skills for defensive purposes”. Support your answer.
2. Briefly explain how to Be Ethical. Compose a scenario to illustrate Ethical hacking (15) BTL6 Create
is suitable in that environment.
3. Assess the different categories of hackers. Identify the situations under which (15) BTL5 Evaluate
hackers from one category would be preferable over the other categories.
4. Estimate Testing Types used in penetration test in security systems. (15) BTL5 Evaluate
5 Formulate the types of Ethical Hacks in an organization’s security system also (15) BTL6 Create
identify most common entry points for an attack.
UNIT II -FOOTPRINTING & PORT SCANNING
Foot printing - Introduction to foot printing, Understanding the information gathering methodology of
the hackers, Tools used for the reconnaissance phase. Port Scanning - Introduction, using port scanning
tools, ping sweeps, Scripting Enumeration-Introduction.
PART – A
1. Define footprinting BTL1 Remember
2. What is meant by Reconnaissance? BTL1 Remember
3. Express the idea of Competitive intelligence. BTL2 Understand
\.
4. What do you know about NSlookup? BTL1 Remember
5. Predict the countermeasures that can be taken against footprinting? BTL2 Understand
6. Differentiate NSlookup and DNSstuff. BTL2 Understand
7. Formulate a plan to create pieces of information to be gathered about a Create
BTL6
target during footprinting.
8. Show the ways to gain information that can be used to perform DNS BTL3 Apply
9. enumeration.
Define Types of DNS Records BTL1 Remember
10. Illustrate the seven steps of Information-Gathering Methodology BTL3 Apply
11. Give the functions of the EDGAR database BTL2 Understand
12. Infer the use of “Whois” for footprinting? BTL4 Analyze
13. Compare and Contrast Domain name lookup and Whois BTL4 Analyze
14. Develop a solution to Find the Address Range of the Network. BTL6 Create
15. Assess why the Whois tool is used? BTL5 Evaluate
16. Point out the features of ARIN database. BTL4 Analyze
17. Assess the term Computer-based social-engineering attacks. BTL5 Evaluate
18. List the tools used for the reconnaissance phase. BTL1 Remember
19. Demonstrate the process of DNS enumeration. BTL3 Apply
20. Define Phishing Attacks. BTL1 Remember
21. Interpret countermeasures can be taken against footprinting. BTL3 Apply
22. Discuss are objectives of network scanning? BTL2 Understand
23. Evaluate the pre-requisites for system hacking. What are the steps for hacking a BTL5 Evaluate
24. system?
Examine the statement “As Security increases system’s functions and ease
BTL4
of use decreases for users”. Analyze
PART-B
1. Examine why do attacker need footprinting? What are the objectives of (13) BTL1 Remember
footprinting?
2. Give the comparison of various common tools used for footprinting and (13) BTL5 Evaluate
information gathering.
3. Describe the following terms in detail: BTL1 Remember
(i) Active information gathering. (5)
(ii) Pseudonymous footprinting (4)
(iii) Internet foorprinting (4)
4. Explain what are the countermeasures against identity theft? (13) BTL1 Remember
5. Demonstrate the principle of Information-Gathering Methodology. (13) BTL3 Apply
6. Summarize the pieces of information to be gathered about a target during (13) BTL2 Understand
footprinting.
7. With a scenario, explain Human-Based Social Engineering. (13) BTL4 Analyze
8. Examine the risks of social networking. What type of behaviours can be (13) BTL3 Apply
vulnerable to social engineering attacks?
9. Explain what is vulnerability scanning? What can it be detected? (13) BTL4 Analyze
10. i) Summarize Port-Scan measures. (7) BTL2 Understand
ii) What are the counter measures against the port scanning? (6)
11. Formulate the Tools used for the reconnaissance phase. (13) BTL6 Create
12. Explain the scanning methodology in detail. (13) BTL1 Remember
13. Identify the countermeasures against SMTP, LDAP and SMB enumeration. (13) BTL2 Understand
Explain
14. Analyze the common social engineering targets and defence strategies. (13) BTL4 Analyze
15. State how the footprinting is done through social engineering? Explain. (13) BTL2 Understand
strategies.
16. Demonstrate the footprinting tools used in hacking. (13) BTL3 Apply
17. Assess why is banner grabbing used? What are its types? Explain. (13) BTL5 Evaluate
PART-C
1. Evaluate the reasons for insider attacks? How can these attacks be prevented? (15) BTL5 Evaluate
2. Design the solutions to stop your website getting hacked. (15) BTL6 Create
3. Assess the counter measures against banner grabbing? (15) BTL5 Evaluate

4. A hacker broke into the database of Zomato, India’s largest online restaurant (15) BTL5 Evaluate
guide, and accessed five vital details – names, emails, numeric user IDs, user
names and password hashes – of around 17 million users. Estimate its impact and
bring out its vulnerabilities which can be overcomed by ethical hacking.
5 Formulate the CEH scanning methodology. (15) BTL6 Create

UNIT III - SYSTEM HACKING


Aspect of remote password guessing, Role of eavesdropping ,Various methods of password cracking,
Keystroke Loggers, Understanding Sniffers ,Comprehending Active and Passive Sniffing, ARP Spoofing and
Redirection.
PART – A
1. Define Offline Attacks. BTL1 Remember
2. Tabulate the services of Shoulder surfing BTL1 Remember
3. Show the importance of Keyloggers and Other Spyware Technologies. BTL3 Apply
4. Evaluate in what ways to crack passwords? BTL5 Evaluate
5. Define the threats due to packet sniffing. BTL1 Remember
6. Interpret what is packet sniffing? How is it done? What are the threats due to BTL3 Apply
packet sniffing?
7. Summarize sniffers work. BTL2 Understand
8. Identify different types of sniffing attacks. BTL2 Understand
9. Illustrate the two types of sniffing. What protocols are vulnerable to sniffing. BTL1 Remember
10. Discuss about Norton Internet Security BTL2 Understand
11. Give the limitations of the automatic password cracking algorithm. BTL2 Understand
12. Analyze the purpose of Rainbow attack? How is it carried out? BTL4 Analyze
13. List the elements of password-cracking tools. BTL1 Remember
14. Classify the different types of password attacks. BTL4 Analyze
15. Create different ways to develop anonymity. BTL6 Create
16. Discriminate ImageHide and blindside Steganography Technologies BTL5 Evaluate
17. Show the differences between phishing and spoofing. BTL3 Apply
18. Point out the features of how we can defend against password cracking. BTL4 Analyze
19. Generalize the suggestions of Defending Against Password Guessing BTL6 Create
20. Define Escalating Privileges BTL1 Remember
21 Classify the steganography techniques. BTL2 Understand
22 Interpret the Active Online Attacks. BTL3 Apply
23 Examine Automated Password Guessing. BTL4 Analyze
24 Assess how are hash passwords stored in Microsoft security accounts manager? BTL5 Evaluate

PART – B
1. Explain the steps involved in cracking a Password? (13) BTL5 Evaluate
2. Describe the in detail various password-cracking tools. (13) BTL1 Remember
(ii) Explain.(6)
3. Illustrate the different types of sniffing attacks. (13) BTL3 Apply
4. (i) Demonstrate elements of password cracking tools. (7) BTL3 Apply
(ii) Demonstrate briefly about types of passwords (6)
5. Develop a solution to store hash passwords in Microsoft security accounts (13) BTL6 Create
manager. Explain Microsoft authentication mechanism?
6. Describe the classification of steganography. (13) BTL1 Remember
7. Classify briefly about the various categories of online attacks. (13) BTL4 Analyze
8. (i) Discuss in detail Spector hacking tool. (7) BTL2 Understand
(ii)Interpret the functions of SpyAnywhere. (6)
9. Describe the NetBIOS DoS Attacks (13) BTL1 Remember
10. Summarize the characteristics of SMB Relay MITM Attacks and Countermeasures. (13) BTL2 Understand

11. (i)Explain the ImageHide Steganography Technologies. (7) BTL1 Remember


(ii)Explain the Blindside Steganography Technologies. (6)
12. Summarize the Shoulder surfing technique with a suitable real time scenario. (13) BTL2 Understand
13. Know how evidence of hacking activity is eliminated by attackers? (13) BTL4 Analyze
Justify your answer.
14. Explain the similarities and dissimilarities between the types of non-electronic (13) BTL4 Analyze
attacks.
15 What is sniffing? Summarize its types in Ethical Hacking. (13) BTL2 Understand

16 Interpret NTFS File Streaming. Also mention the countermeasures. (13) BTL3 Apply

17 Assess how to Cover Tracks and Erase Evidence. (13) BTL5 Evaluate

PART-C
1. Give an overview of the working of password cracking pen testing. Briefly (15) BTL5 Evaluate
Evaluate the distinguishing features of the same.
2. Prepare a list of important functional differences and similarities between (15) BTL6 Create
steganography techniques.
3. What do you understand by rootkits? Mention a few characteristic feature of this. (15) BTL5 Evaluate
Assess its objectives? How does an attacker place rootkit? What are the different
types of rootkits?
4. Estimate the reasons as to why a spyware is used? How can it be propagated? (15) BTL5 Evaluate
What are different types of spywares?
5 What is privilege escalation? What are its types? Develop a solution so that (15) BTL6 Create
system be protected against privilege escalation?
UNIT IV - HACKING WEB SERVICES & SESSION HIJACKING
Web application vulnerabilities, application coding errors, SQL injection into Backend Databases,
cross-site scripting, cross-site request forging, authentication bypass, web services and related flaws,
protective http headers Understanding Session Hijacking, Phases involved in Session Hijacking, Types
of Session Hijacking.
PART – A
1. Define SQL injection. BTL1 Remember
2. Show the vulnerabilities of Web application. BTL3 Apply
3. Summarize the characteristics of Session Hijacking. BTL5 Evaluate
4. Examine the requirement for session fixation. BTL3 Apply
5. What is cross-site scripting? BTL1 Remember
6. Classify the Types of Session Hijacking. BTL4 Analyze
7. Develop a solution for the identification of cross-site request forging. BTL6 Create
8. Give a comparison between cross-site scripting, cross-site request forging. BTL5 Evaluate
9. Analyze about the term ‘spoofing’. BTL4 Analyze
10. Express what is cookie poisoning? How does it work? BTL2 Understand
11. Distinguish patches and hotfixes. BTL2 Understand
12. List the characteristics of LDAP injection. BTL1 Remember
13. Differentiate HTTP response splitting and web cache poisoning. BTL4 Analyze
14. List the steps in the operation of signature evasion techniques. . BTL1 Remember
15. Design a schematic model of parameter tampering attack. . BTL6 Create
16. Interpret the impact of webserver attacks. BTL2 Understand
17. Tabulate the different threats to web applications. BTL1 Remember
18. Identify the issues that are addressed by web attack vectors. BTL1 Remember
19. Interpret the concept of simple and union SQL injection attacks. BTL2 Understand
20. Show the strategies of injection flaws that be deployed in a web applications. BTL3 Apply
21 Classify the Man-in-the-middle and man-in-the-browser attacks. BTL2 Understand
22 Demonstrate database, table and column be enumerated using SQL injection? BTL3 Apply
Explain.
23 Examine how invalidated redirects and forwards make web applications BTL4 Analyze
vulnerable? Explain
24 Assess the effects of webserver misconfiguration. Explain with example. BTL5 Evaluate

PART – B
1. (i)Discuss the characteristics of cross site scripting attacks. (7) BTL2 Understand
(ii)Summarize the cross site request forgery attack. (6)
2. (i)Illustrate in brute force be used for session hijacking detail. (7) BTL3 Apply
(ii)Show the working of referrer attack. (6)
3. Demonstrate how session hijacking is successfully carried out. (13) BTL3 Apply
4. (i)Integrate the problems caused by web services foot printing attack and (7) BTL6 Create
web service XML poisoning.
(ii)How are these problems addressed? (6)
5. Evaluate network level and application level session hijacking. (13) BTL5 Evaluate

6. Describe session hijacking? What are the steps to hijack a session? What are the (13) BTL2 Understand
dangers posed by hijacking a session?
7. State the sophisticated matches, hex encoding and manipulating white spaces (13) BTL1 Remember
evasion techniques.
8. Describe the design issues of TCP/IP hijacking? How is it performed? (13) BTL1 Remember
9. (i)Explain Session fixation. (7) BTL4 Analyze
(ii)Pointout the techniques used for session fixation. (6)
10. Write short notes on: BTL1 Remember
(i) Threats to web applications (7)
(ii) Web attack vectors (6)
11. Explain the major types of security attacks that are possible in a computer (13) BTL1 Remember
system.
12. (i)Express the counter measures against session hijacking. (7) BTL2 Understand
(ii)How it is addressed in real world. (6)
13. Classify the different categories of hijacking. (13) BTL4 Analyze
14. Point out the factors that make the SQL injection attacks with examples. BTL4 Analyze
a) Code analysis (3)
b) Attack Analysis (2)
c) Updating a table (2)
d) Adding new records (2)
e) Identifying table name (2)
f) Deleting the table (2)
15. Discuss cross site scripting attack. How is it done? (13) BTL2 Understand

16. Demonstrate the web application vulnerability stack. (13) BTL3 Apply

17. With respect to web applications, Assess the injection flaws? What are its (13) BTL5 Evaluate
different types? Explain.
PART-C
1. Pointout how does insufficient transport layer security and improper error (15) BTL6 Create
handling make web applications vulnerable? Explain.
2. What do you mean by website defacement? Assess why are webservers (15) BTL5 Evaluate
compromised? What are the consequences of webserver compromisation?
3. Justify how can SQL injection be used for the following: (15) BTL6 Create
a) Transfer database to attacker’s machine.
b) Interact with the operating system.
c) Interact with the file system.
d) Network reconnaissance.
4. With respecta to
Compose web applications,
solution to overcomewhat
fromare injection
these flaws? What(15)
types of. are its different (15) BTL5 Evaluate
types? Evaluate.
5. Estimate the different types of attacks on authentication mechanisms of web (15) BTL5 Evaluate
applications?
UNIT V HACKING WIRELESS NETWORKS
Introduction to 802.11, Role of WEP, Cracking WEP Keys, Sniffing Traffic, Wireless DOS attacks,
WLAN Scanners, WLAN Sniffers, Hacking Tools, Securing Wireless Networks.

1. What is service set identifier? BTL1 Remember

2. Give the features of Evil Twin attack. BTL2 Understand


3. Differentiate MAC spoofing attack and De-authentication and disassociation. BTL2 Understand

4. Show the HoneySpot Access point. BTL3 Apply


5. Define Wi-Fi chalking. BTL1 Remember
6. Assess the different ways of footprinting wireless networks. BTL5 Evaluate
7. What is WEP encryption? BTL1 Remember

8. Explain the process of bluejack a victim. BTL5 Evaluate

9. Express WPA. BTL2 Understand


10. Define WPA2. BTL1 Remember

11. Show what is GPS mapping? How does and attacker use it? BTL3 Apply

12. List the different attacks of Aircrack-ng suite. BTL1 Remember

13. Pointout the drawbacks of Jamming signal attack BTL4 Analyze


14. Analyze the features of temporal keys. BTL4 Analyze
15. Describe the different authentication modes of BTL3 Apply
Wi-Fi.
16. Develop rogue access point attack. BTL6 Create
17. Describe the features of countermeasures against Bluetooth hacking. BTL2 Understand
18. Differentiate WEP, WPA and WPA2. BTL4 Analyze
19. Formulate the issues with WEP. BTL6 Create
20. Enumerate the reasons that make initialization vectors weak. BTL1 Remember
21 Discuss how WEP encryption be broken. BTL2 Understand
22 Interpret how we can defend against WPS cracking. BTL3 Apply
23 Distinguish wireless access control threats. BTL4 Analyze
24 Assess how integrity attacks be launched on wireless networks. BTL5 Evaluate

PART – B
1. Explain the 802.1X authentication process. (13) BTL5 Evaluate
2. i) Discuss the ideas of Rogue Access Points. (7) BTL2 Understand
ii) Give the mechanisms of detection Rogue Access Points. (6)
3. Compare and contrast the various Wi-Fi security. (13) BTL4 Analyze

4. Summarize the various features of Evil Twin or AP Masquerading. (13) BTL2 Understand
5. List and explain the Wireless Hacking Techniques. (13) BTL1 Remember
6. Illustrate following attacks on wireless networks: BTL3 Apply
a) Client Mis-association. (7)
b) Mis-configured access point (6)
7. i)Illustrate the impact of Wireless DOS attacks . (7) BTL3 Apply
ii)Examine the possible reasons to rapidly counter the Wireless DOS attacks (6)
8. Write detailed notes on Securing Home Wireless Networks. (13) BTL1 Remember

9. (i)What do you understand by availability attacks that can be launched on wireless BTL1 Remember
networks? (7)
(ii)Identify the situation of availability attacks and how it can be prevented? (6)
10. Generalize the ideas of different confidentiality attacks that can be launched on BTL6 Create
wireless networks?. What are the. What are the different authentication attacks (13)
that can be launched on wireless networks? Explain
11. (i)Identify the properties of Honey-Spot Access point. (7) BTL1 Remember
(ii) Describe about Access point MAC spoofing. (6)
12. Explain the Wireless DOS attacks and security issues. BTL2 Understand
(13)
13. (i) Analyze how the WLAN Sniffers work. (7) BTL4 Analyze
(ii) What do you understand by the Sniffing Traffic? (6)
14. Explain the different wireless security layers. (13) BTL4 Analyze

15. Identify the different confidentiality attacks that can be launched on wireless BTL2 Understand
networks? Explain. (13)
16. Interpret the wireless intrusion prevention systems. How are they deployed? BTL3 Apply
(13)
17. Summarize WEP encryption. What are its goals? What are flaws in WEP (13) BTL5 Evaluate
encryption?
PART-C
1. Assess the special features that ethical hacking tools should possess. Take any (15) BTL5 Evaluate
tool as example and explain the features of the same.
2. Estimate the principle functions of sniffing tools and explain with an example (15) BTL5 Evaluate
implemented on wireless networks and the specific service that it make use of it.
3. What do you understand by wireless hacking? Summarize the different wireless (15) BTL5 Evaluate
hacking methodology that are available.
4. Formulate all possible attacks on wireless networks. (15) BTL6 Create
Explain integrity attacks be launched on wireless networks in which is useful?
5. Justify how the following attacks be launched using Aircrack-ng suite. BTL6 Create
a) Revealing hidden SSID (5)
b) Fragmentation attack (5)
c) MAC spoofing attack (5)
d) De-authentication and disassociation (5)
e) Man in the middle attack (5)

You might also like