EC-Council CEH (Certified Ethical Hacker) Exam Guide

The **CEH** is one of the most well-known ethical hacking certifications. It teaches the tools and techniques used by hackers to better defend systems. A practical version (CEH Practical) also exists.

What is the first phase of an ethical hacking attack?

Answer : Reconnaissance (Footprinting).

This is the stage where the attacker gathers maximum information about the target (IP addresses, domain names, employees, etc.) before launching an attack.

Which tool is commonly used for port scanning and service discovery on a network?

Answer : Nmap.

Nmap is the reference tool for mapping a network, identifying open ports, and guessing the operating system used.

What is a 'Distributed Denial of Service' (DDoS) attack?

Answer : An attack using multiple machines (botnet) to overwhelm a target with traffic and make it unavailable.

Unlike simple DoS, DDoS is much harder to block because the traffic comes from thousands of different sources.

Which type of malware spreads itself through a network without human intervention?

Answer : A worm.

Unlike a virus that requires executing a host file, a worm exploits network vulnerabilities to self-replicate.

What is the term for psychological manipulation of a person to obtain confidential information?

Answer : Social Engineering.

This is often the weakest link in security, using phishing, pretexting, or baiting to deceive users.

Related Certifications

Local Testing

Careers

preload
preload
preload
preload
preload
preload