The **CEH** is one of the most well-known ethical hacking certifications. It teaches the tools and techniques used by hackers to better defend systems. A practical version (CEH Practical) also exists.
Answer : Reconnaissance (Footprinting).
This is the stage where the attacker gathers maximum information about the target (IP addresses, domain names, employees, etc.) before launching an attack.
Answer : Nmap.
Nmap is the reference tool for mapping a network, identifying open ports, and guessing the operating system used.
Answer : An attack using multiple machines (botnet) to overwhelm a target with traffic and make it unavailable.
Unlike simple DoS, DDoS is much harder to block because the traffic comes from thousands of different sources.
Answer : A worm.
Unlike a virus that requires executing a host file, a worm exploits network vulnerabilities to self-replicate.
Answer : Social Engineering.
This is often the weakest link in security, using phishing, pretexting, or baiting to deceive users.