Ethical Hacking Exam Prep
Ethical Hacking Exam Prep
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK
VII SEMESTER
Regulation–2019
Prepared by
Mr.Suma.S, Assistant Professor/CSE
SRM VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur– 603203.
QUESTION BANK
SUBJECT : 1904711 ETHICAL HACKING
SEM / YEAR: VII / IV
PART A
Q.No Questions BT Level Competence
1. Define Ethical hacking. BTL1 Remember
2. Tabulate the Vulnerabilities. BTL1 Remember
3. Differentiate Threat and Attack. BTL2 Understand
4. List out the importance of security. BTL1 Remember
5. Point out the purpose of hacking. BTL4 Analyze
6. Give the types of Hacking Technologies. BTL2 Understand
7. What is Exploit in hacking? BTL1 Remember
8. List out the various groups in hackers. BTL1 Remember
9. Point out the tasks performed by an ethical hacker. BTL4 Analyze
10. Define a hacker. BTL1 Remember
11. Illustrate penetration test process. BTL3 Apply
12. Classify the various aspects of hacking. BTL4 Analyze
13. Distinguish hacking with ethical hacking. BTL2 Understand
14. Give the activities during the phase of the attacks. BTL2 Understand
15. Show the importance of white hats in hacking. BTL3 Apply
16. Classify the essential Terminologies involved in hacking. BTL3 Apply
17. Compose a role which is played by zombie system. BTL6 Create
18. Assess why ethical hacking is allowed. Justify your answer. BTL5 Evaluate
19. Develop Target of Evaluation strategy. BTL6 Create
20. Formulate the phases involved in hacking. BTL5 Evaluate
21 Discuss types of testing on the system. BTL2 Understand
22 Intrepret the most common entry points for an attack. BTL3 Apply
23 Analyze the tools that a hacker may employ during the scanning phase. BTL4 Analyze
24 Assess the Passive and Active Reconnaissance methods. BTL5 Evaluate
PART – B
1. (i)Analyze the various types of hacker classes. (7) BTL4 Analyze
(ii)Explain in detail about ethical Hacking. (6)
2. Describe in detail the different phases involved in Ethical Hacking. (13) BTL2 Understand
3. (i)Compare and contrast white hats and black hats. (7) BTL4 Analyze
(ii)Analyze the skills required for an ethical Hacker. (6)
4. (i)Demonstrate the Purpose of Ethical Hacking. (7) BTL3 Apply
(ii) Demonstrate the role of white hats. (6)
5. (i)How do gray hats act under various situations? Justify your Statement. (7) BTL1 Remember
(ii)Identify the use of pen test in hacking. (6)
6. Explain the Ethical Hacking Terminology with suitable examples. (13) BTL1 Remember
7. Differentiate between hats involved in hacking. (13) BTL2 Understand
8. (i)Classify the groups involved in hacking. (7) BTL3 Apply
(ii)Examine how the goals attackers try to achieve security breach. (6)
9. Generalize the Ethical Hacking Terminology (13) BTL6 Create
10. (i) Examine the characteristics Ethical Hacker’s Skill Set. (7) BTL1 Remember
(ii) Describe Sniffing the network. (6)
11. Explain the different types of hacking technologies in detail. (13) BTL4 Analyze
12. Discuss: (7) BTL2 Understand
(i) Vulnerability research (6)
(ii) Hacktivism
13. (i)Describe the role of Port scanners. (7)
(7) BTL1 Remember
(ii) Identify the role Internet Control Message Protocol (ICMP) scanners. (6)
(6)
14. Summarize the issues involved in ethical hacking. (13) BTL5 Evaluate
15. List the five stages of ethical hacking. (13) BTL5 Evaluate
16. Describe the ways of conducting ethical hacking. (13) BTL2 Understand
17. Interpret the legal implications of hacking (13) BTL3 Apply
PART –C
1. Do you agree with the following statement: “White-hat hackers are “good” guys (15) BTL5 Evaluate
who use their skills for defensive purposes”. Support your answer.
2. Briefly explain how to Be Ethical. Compose a scenario to illustrate Ethical hacking (15) BTL6 Create
is suitable in that environment.
3. Assess the different categories of hackers. Identify the situations under which (15) BTL5 Evaluate
hackers from one category would be preferable over the other categories.
4. Estimate Testing Types used in penetration test in security systems. (15) BTL5 Evaluate
5 Formulate the types of Ethical Hacks in an organization’s security system also (15) BTL6 Create
identify most common entry points for an attack.
UNIT II -FOOTPRINTING & PORT SCANNING
Foot printing - Introduction to foot printing, Understanding the information gathering methodology of
the hackers, Tools used for the reconnaissance phase. Port Scanning - Introduction, using port scanning
tools, ping sweeps, Scripting Enumeration-Introduction.
PART – A
1. Define footprinting BTL1 Remember
2. What is meant by Reconnaissance? BTL1 Remember
3. Express the idea of Competitive intelligence. BTL2 Understand
\.
4. What do you know about NSlookup? BTL1 Remember
5. Predict the countermeasures that can be taken against footprinting? BTL2 Understand
6. Differentiate NSlookup and DNSstuff. BTL2 Understand
7. Formulate a plan to create pieces of information to be gathered about a Create
BTL6
target during footprinting.
8. Show the ways to gain information that can be used to perform DNS BTL3 Apply
9. enumeration.
Define Types of DNS Records BTL1 Remember
10. Illustrate the seven steps of Information-Gathering Methodology BTL3 Apply
11. Give the functions of the EDGAR database BTL2 Understand
12. Infer the use of “Whois” for footprinting? BTL4 Analyze
13. Compare and Contrast Domain name lookup and Whois BTL4 Analyze
14. Develop a solution to Find the Address Range of the Network. BTL6 Create
15. Assess why the Whois tool is used? BTL5 Evaluate
16. Point out the features of ARIN database. BTL4 Analyze
17. Assess the term Computer-based social-engineering attacks. BTL5 Evaluate
18. List the tools used for the reconnaissance phase. BTL1 Remember
19. Demonstrate the process of DNS enumeration. BTL3 Apply
20. Define Phishing Attacks. BTL1 Remember
21. Interpret countermeasures can be taken against footprinting. BTL3 Apply
22. Discuss are objectives of network scanning? BTL2 Understand
23. Evaluate the pre-requisites for system hacking. What are the steps for hacking a BTL5 Evaluate
24. system?
Examine the statement “As Security increases system’s functions and ease
BTL4
of use decreases for users”. Analyze
PART-B
1. Examine why do attacker need footprinting? What are the objectives of (13) BTL1 Remember
footprinting?
2. Give the comparison of various common tools used for footprinting and (13) BTL5 Evaluate
information gathering.
3. Describe the following terms in detail: BTL1 Remember
(i) Active information gathering. (5)
(ii) Pseudonymous footprinting (4)
(iii) Internet foorprinting (4)
4. Explain what are the countermeasures against identity theft? (13) BTL1 Remember
5. Demonstrate the principle of Information-Gathering Methodology. (13) BTL3 Apply
6. Summarize the pieces of information to be gathered about a target during (13) BTL2 Understand
footprinting.
7. With a scenario, explain Human-Based Social Engineering. (13) BTL4 Analyze
8. Examine the risks of social networking. What type of behaviours can be (13) BTL3 Apply
vulnerable to social engineering attacks?
9. Explain what is vulnerability scanning? What can it be detected? (13) BTL4 Analyze
10. i) Summarize Port-Scan measures. (7) BTL2 Understand
ii) What are the counter measures against the port scanning? (6)
11. Formulate the Tools used for the reconnaissance phase. (13) BTL6 Create
12. Explain the scanning methodology in detail. (13) BTL1 Remember
13. Identify the countermeasures against SMTP, LDAP and SMB enumeration. (13) BTL2 Understand
Explain
14. Analyze the common social engineering targets and defence strategies. (13) BTL4 Analyze
15. State how the footprinting is done through social engineering? Explain. (13) BTL2 Understand
strategies.
16. Demonstrate the footprinting tools used in hacking. (13) BTL3 Apply
17. Assess why is banner grabbing used? What are its types? Explain. (13) BTL5 Evaluate
PART-C
1. Evaluate the reasons for insider attacks? How can these attacks be prevented? (15) BTL5 Evaluate
2. Design the solutions to stop your website getting hacked. (15) BTL6 Create
3. Assess the counter measures against banner grabbing? (15) BTL5 Evaluate
4. A hacker broke into the database of Zomato, India’s largest online restaurant (15) BTL5 Evaluate
guide, and accessed five vital details – names, emails, numeric user IDs, user
names and password hashes – of around 17 million users. Estimate its impact and
bring out its vulnerabilities which can be overcomed by ethical hacking.
5 Formulate the CEH scanning methodology. (15) BTL6 Create
PART – B
1. Explain the steps involved in cracking a Password? (13) BTL5 Evaluate
2. Describe the in detail various password-cracking tools. (13) BTL1 Remember
(ii) Explain.(6)
3. Illustrate the different types of sniffing attacks. (13) BTL3 Apply
4. (i) Demonstrate elements of password cracking tools. (7) BTL3 Apply
(ii) Demonstrate briefly about types of passwords (6)
5. Develop a solution to store hash passwords in Microsoft security accounts (13) BTL6 Create
manager. Explain Microsoft authentication mechanism?
6. Describe the classification of steganography. (13) BTL1 Remember
7. Classify briefly about the various categories of online attacks. (13) BTL4 Analyze
8. (i) Discuss in detail Spector hacking tool. (7) BTL2 Understand
(ii)Interpret the functions of SpyAnywhere. (6)
9. Describe the NetBIOS DoS Attacks (13) BTL1 Remember
10. Summarize the characteristics of SMB Relay MITM Attacks and Countermeasures. (13) BTL2 Understand
16 Interpret NTFS File Streaming. Also mention the countermeasures. (13) BTL3 Apply
17 Assess how to Cover Tracks and Erase Evidence. (13) BTL5 Evaluate
PART-C
1. Give an overview of the working of password cracking pen testing. Briefly (15) BTL5 Evaluate
Evaluate the distinguishing features of the same.
2. Prepare a list of important functional differences and similarities between (15) BTL6 Create
steganography techniques.
3. What do you understand by rootkits? Mention a few characteristic feature of this. (15) BTL5 Evaluate
Assess its objectives? How does an attacker place rootkit? What are the different
types of rootkits?
4. Estimate the reasons as to why a spyware is used? How can it be propagated? (15) BTL5 Evaluate
What are different types of spywares?
5 What is privilege escalation? What are its types? Develop a solution so that (15) BTL6 Create
system be protected against privilege escalation?
UNIT IV - HACKING WEB SERVICES & SESSION HIJACKING
Web application vulnerabilities, application coding errors, SQL injection into Backend Databases,
cross-site scripting, cross-site request forging, authentication bypass, web services and related flaws,
protective http headers Understanding Session Hijacking, Phases involved in Session Hijacking, Types
of Session Hijacking.
PART – A
1. Define SQL injection. BTL1 Remember
2. Show the vulnerabilities of Web application. BTL3 Apply
3. Summarize the characteristics of Session Hijacking. BTL5 Evaluate
4. Examine the requirement for session fixation. BTL3 Apply
5. What is cross-site scripting? BTL1 Remember
6. Classify the Types of Session Hijacking. BTL4 Analyze
7. Develop a solution for the identification of cross-site request forging. BTL6 Create
8. Give a comparison between cross-site scripting, cross-site request forging. BTL5 Evaluate
9. Analyze about the term ‘spoofing’. BTL4 Analyze
10. Express what is cookie poisoning? How does it work? BTL2 Understand
11. Distinguish patches and hotfixes. BTL2 Understand
12. List the characteristics of LDAP injection. BTL1 Remember
13. Differentiate HTTP response splitting and web cache poisoning. BTL4 Analyze
14. List the steps in the operation of signature evasion techniques. . BTL1 Remember
15. Design a schematic model of parameter tampering attack. . BTL6 Create
16. Interpret the impact of webserver attacks. BTL2 Understand
17. Tabulate the different threats to web applications. BTL1 Remember
18. Identify the issues that are addressed by web attack vectors. BTL1 Remember
19. Interpret the concept of simple and union SQL injection attacks. BTL2 Understand
20. Show the strategies of injection flaws that be deployed in a web applications. BTL3 Apply
21 Classify the Man-in-the-middle and man-in-the-browser attacks. BTL2 Understand
22 Demonstrate database, table and column be enumerated using SQL injection? BTL3 Apply
Explain.
23 Examine how invalidated redirects and forwards make web applications BTL4 Analyze
vulnerable? Explain
24 Assess the effects of webserver misconfiguration. Explain with example. BTL5 Evaluate
PART – B
1. (i)Discuss the characteristics of cross site scripting attacks. (7) BTL2 Understand
(ii)Summarize the cross site request forgery attack. (6)
2. (i)Illustrate in brute force be used for session hijacking detail. (7) BTL3 Apply
(ii)Show the working of referrer attack. (6)
3. Demonstrate how session hijacking is successfully carried out. (13) BTL3 Apply
4. (i)Integrate the problems caused by web services foot printing attack and (7) BTL6 Create
web service XML poisoning.
(ii)How are these problems addressed? (6)
5. Evaluate network level and application level session hijacking. (13) BTL5 Evaluate
6. Describe session hijacking? What are the steps to hijack a session? What are the (13) BTL2 Understand
dangers posed by hijacking a session?
7. State the sophisticated matches, hex encoding and manipulating white spaces (13) BTL1 Remember
evasion techniques.
8. Describe the design issues of TCP/IP hijacking? How is it performed? (13) BTL1 Remember
9. (i)Explain Session fixation. (7) BTL4 Analyze
(ii)Pointout the techniques used for session fixation. (6)
10. Write short notes on: BTL1 Remember
(i) Threats to web applications (7)
(ii) Web attack vectors (6)
11. Explain the major types of security attacks that are possible in a computer (13) BTL1 Remember
system.
12. (i)Express the counter measures against session hijacking. (7) BTL2 Understand
(ii)How it is addressed in real world. (6)
13. Classify the different categories of hijacking. (13) BTL4 Analyze
14. Point out the factors that make the SQL injection attacks with examples. BTL4 Analyze
a) Code analysis (3)
b) Attack Analysis (2)
c) Updating a table (2)
d) Adding new records (2)
e) Identifying table name (2)
f) Deleting the table (2)
15. Discuss cross site scripting attack. How is it done? (13) BTL2 Understand
16. Demonstrate the web application vulnerability stack. (13) BTL3 Apply
17. With respect to web applications, Assess the injection flaws? What are its (13) BTL5 Evaluate
different types? Explain.
PART-C
1. Pointout how does insufficient transport layer security and improper error (15) BTL6 Create
handling make web applications vulnerable? Explain.
2. What do you mean by website defacement? Assess why are webservers (15) BTL5 Evaluate
compromised? What are the consequences of webserver compromisation?
3. Justify how can SQL injection be used for the following: (15) BTL6 Create
a) Transfer database to attacker’s machine.
b) Interact with the operating system.
c) Interact with the file system.
d) Network reconnaissance.
4. With respecta to
Compose web applications,
solution to overcomewhat
fromare injection
these flaws? What(15)
types of. are its different (15) BTL5 Evaluate
types? Evaluate.
5. Estimate the different types of attacks on authentication mechanisms of web (15) BTL5 Evaluate
applications?
UNIT V HACKING WIRELESS NETWORKS
Introduction to 802.11, Role of WEP, Cracking WEP Keys, Sniffing Traffic, Wireless DOS attacks,
WLAN Scanners, WLAN Sniffers, Hacking Tools, Securing Wireless Networks.
11. Show what is GPS mapping? How does and attacker use it? BTL3 Apply
PART – B
1. Explain the 802.1X authentication process. (13) BTL5 Evaluate
2. i) Discuss the ideas of Rogue Access Points. (7) BTL2 Understand
ii) Give the mechanisms of detection Rogue Access Points. (6)
3. Compare and contrast the various Wi-Fi security. (13) BTL4 Analyze
4. Summarize the various features of Evil Twin or AP Masquerading. (13) BTL2 Understand
5. List and explain the Wireless Hacking Techniques. (13) BTL1 Remember
6. Illustrate following attacks on wireless networks: BTL3 Apply
a) Client Mis-association. (7)
b) Mis-configured access point (6)
7. i)Illustrate the impact of Wireless DOS attacks . (7) BTL3 Apply
ii)Examine the possible reasons to rapidly counter the Wireless DOS attacks (6)
8. Write detailed notes on Securing Home Wireless Networks. (13) BTL1 Remember
9. (i)What do you understand by availability attacks that can be launched on wireless BTL1 Remember
networks? (7)
(ii)Identify the situation of availability attacks and how it can be prevented? (6)
10. Generalize the ideas of different confidentiality attacks that can be launched on BTL6 Create
wireless networks?. What are the. What are the different authentication attacks (13)
that can be launched on wireless networks? Explain
11. (i)Identify the properties of Honey-Spot Access point. (7) BTL1 Remember
(ii) Describe about Access point MAC spoofing. (6)
12. Explain the Wireless DOS attacks and security issues. BTL2 Understand
(13)
13. (i) Analyze how the WLAN Sniffers work. (7) BTL4 Analyze
(ii) What do you understand by the Sniffing Traffic? (6)
14. Explain the different wireless security layers. (13) BTL4 Analyze
15. Identify the different confidentiality attacks that can be launched on wireless BTL2 Understand
networks? Explain. (13)
16. Interpret the wireless intrusion prevention systems. How are they deployed? BTL3 Apply
(13)
17. Summarize WEP encryption. What are its goals? What are flaws in WEP (13) BTL5 Evaluate
encryption?
PART-C
1. Assess the special features that ethical hacking tools should possess. Take any (15) BTL5 Evaluate
tool as example and explain the features of the same.
2. Estimate the principle functions of sniffing tools and explain with an example (15) BTL5 Evaluate
implemented on wireless networks and the specific service that it make use of it.
3. What do you understand by wireless hacking? Summarize the different wireless (15) BTL5 Evaluate
hacking methodology that are available.
4. Formulate all possible attacks on wireless networks. (15) BTL6 Create
Explain integrity attacks be launched on wireless networks in which is useful?
5. Justify how the following attacks be launched using Aircrack-ng suite. BTL6 Create
a) Revealing hidden SSID (5)
b) Fragmentation attack (5)
c) MAC spoofing attack (5)
d) De-authentication and disassociation (5)
e) Man in the middle attack (5)