We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Ethical Hacking Question Paper
Q.1: What is SSID?
Q.2: How would you describe the process of shared key authentication in wireless networks? Q.3: Where is the password hashes are stored in Windows XP and Linux OS? Q.4: How would you compare LM, NTLM hashes? Q.5: How would you use different type of Keyloggers? Q.6: How would you categorize password attacking techniques? Q.7: Identify the different parts of WEP? Lets assume Data= 13, ICV =01 and KeyStream generated using the WEP key and IV is 100110. Explain how the data will be encrypted, sent and decrypted using WEP.