
- •Acknowledgments
- •About the Author
- •Contents at a Glance
- •Contents
- •Table of Exercises
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Defining Ethical Hacking
- •How to Be Ethical
- •Keeping It Legal
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Reconnaissance
- •Information-Gathering Methodology
- •Social Engineering
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Scanning
- •Enumeration
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •The Simplest Way to Get a Password
- •Types of Passwords
- •Cracking a Password
- •Understanding Keyloggers and Other Spyware Technologies
- •Escalating Privileges
- •Understanding Rootkits
- •Hiding Files
- •Understanding Steganography Technologies
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Trojans and Backdoors
- •Viruses and Worms
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •How a Sniffer Works
- •Sniffing Countermeasures
- •Bypassing the Limitations of Switches
- •Wireshark Filters
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Denial of Service
- •Session Hijacking
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •How Web Servers Work
- •Types of Web Server Vulnerabilities
- •Web Application Vulnerabilities
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •SQL Injection
- •Buffer Overflows
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Wi-Fi and Ethernet
- •Authentication and Cracking Techniques
- •Using Wireless Sniffers to Locate SSIDs
- •MAC Filters and MAC Spoofing
- •Rogue Access Points
- •Wireless Hacking Techniques
- •Securing Wireless Networks
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Components of Physical Security
- •Understanding Physical Security
- •Physical Site Security Countermeasures
- •What to Do After a Security Breach Occurs
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Linux Basics
- •Compiling a Linux Kernel
- •GCC Compilation Commands
- •Installing Linux Kernel Modules
- •Linux Hardening Methods
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Types of IDSs and Evasion Techniques
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Generating Public and Private Keys
- •Cryptography Algorithms
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Defining Security Assessments
- •Penetration Testing
- •Pen Test Deliverables
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Glossary
- •Index

Answers to Review Questions |
29 |
Answers to Review Questions
1.A. White-hat hackers are “good” guys who use their skills for defensive purposes.
2.C. White-box testing is a security audit performed with internal knowledge of the systems.
3.D. Reconnaissance is gathering information necessary to perform the attack.
4.D. Physical access tests access to the physical infrastructure.
5.B. As security increases, it makes it more difficult to use and less functional.
6.A. Disgruntled employees have information that can allow them to launch a powerful attack.
7.A, B, C. The three phases of a security evaluation plan are preparation, security evaluation, and conclusion.
8.B. Hacktivism is performed by individuals who claim to be hacking for a political or social cause.
9.B. Title 18 of the US Code is most commonly used to prosecute hackers.
10.A. An attack from the Internet is known as a remote attack.
11.A. The Freedom of Information Act ensures public release of many documents and records and can be a rich source of information on potential targets.
12.A, B, D. Sending spam, installing and using keystroke loggers, and implementing pop-up windows are all prohibited by the SPY ACT.
13.B. Signing an NDA agreement is critical to ensuring the testing is authorized and the ethical hacker has the right to access the client’s systems.
14.D. A target of evaluation is a system, program, or network that is the subject of a security analysis. It is the target of the ethical hacker’s attacks.
15.A. A cracker is a hacker who uses their hacking skills for destructive purposes.
16.C. MAC address spoofing is an authentication attack used to defeat MAC address filters.
17.A. The Patriot Act gives authority to intercept voice communications in many cases, including computer hacking.
18.A, B, C. All information about the testing process, vulnerabilities discovered in the network or system, and suggested countermeasures should be included in the ethical hacking report.
19.B. Disgruntled employees pose the biggest threat to an organization’s security because of the information and access that they possess.
20.A, B. Findings of the test and risk analysis should both be included in an ethical hacking report.


Chapter
2
Gathering Target
Information:
Reconnaissance,
Footprinting, and
Social Engineering
CEH Exam Objectives Covered in
This Chapter:
ÛÛDefine the term footprinting
ÛÛDescribe information-gathering methodology
ÛÛDescribe competitive intelligence
ÛÛUnderstand DNS enumeration
ÛÛUnderstand Whois, ARIN lookup
ÛÛIdentify different types of DNS records
ÛÛUnderstand how traceroute is used in footprinting
ÛÛUnderstand how email tracking works
ÛÛUnderstand how web spiders work
ÛÛWhat is social engineering?
ÛÛWhat are the common types of attacks?
ÛÛUnderstand dumpster diving
ÛÛUnderstand reverse social engineering

ÛÛUnderstand insider attacks
ÛÛUnderstand identity theft
ÛÛDescribe phishing attacks
ÛÛUnderstand online scams
ÛÛUnderstand URL obfuscation
ÛÛSocial-engineering countermeasures