solutions verified graded a++ revised 2025/2026
Hacker is a person who illegally d.Maintaining Access
breaks into a system or network
without any authorization to e. Clearing tracks
destroy, steal sensitive data or to
perform any malicious attacks.
Black Hat hackers are:
a. Individuals professing hacker
skills and using them for
defensive purposes and are also
known as security analysts
b. Individuals with extraordinary
skills, re- sorting to malicious or
destructive activi- ties and are
also known as crackers.
c. Individual to aim to bring
down critical infrastructure for a
"cause" and are not worried
about facing 30 years in jail for
their actions.
d. Individuals who work both
offensively and defensively at
various times.
In order to compromise or to hack
a sys- tem or network the hacker
go through various phases of
hacking.What is the first hacking
phase that hackers perform to
gather information about a target
prior to launching an attack?
a. Reconnaissance
b.Scanning
c. Gaining access
1/
161
, CEH v10 Questions and answers with complete
solutions verified graded a++ revised 2025/2026
b. Individuals with extraordinary
skills, re- sorting to malicious or
destructive activi- ties and are
also known as crackers.
a. Reconnaissance
2/
161
, CEH v10 Questions and answers with complete
solutions verified graded a++ revised 2025/2026
Defense-in-depth is a security c. Stealth scanning technique
strategy in which several
protection layers are placed d.FIN scanning technique
throughout an information sys-
tem. It helps to prevent direct
attacks against an information
system and data because a break
in one layer only leads the
attacker to the next layers.
a.True
b.False
Penetration testing is a method of
ac- tively evaluating the security
of an infor- mation system f
network by simulation an attack
from a malicious source.Which of
the following techniques is used to
simulate an attack from someone
who is unfamiliar with the system?
a.White box pen testing
b.Black Box pen testing
c. Grey box pen testing
d.Announced pen testing
Which of the following scanning
tech- niques do attackers use to
bypass fire- wall rules, logging
mechanism, and hide themselves
as usual network traffic?
a.TCP connect scanning
b.XMAS scanning technique
3/
161
, CEH v10 Questions and answers with complete
solutions verified graded a++ revised 2025/2026
a.True
b.Black Box pen testing
c. Stealth scanning technique
4/
161