100% found this document useful (1 vote)
5K views1 page

Ethical Hacking Questions Paper

Question paper ethical hacking, Footprinting, Scanning, System Hacking, Wireless Hacking, Cryptography

Uploaded by

Ethical Hacking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
5K views1 page

Ethical Hacking Questions Paper

Question paper ethical hacking, Footprinting, Scanning, System Hacking, Wireless Hacking, Cryptography

Uploaded by

Ethical Hacking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Ethical Hacking Question Paper

Q.1: What is SSID?


Q.2: How would you describe the process of shared key authentication in wireless networks?
Q.3: Where is the password hashes are stored in Windows XP and Linux OS?
Q.4: How would you compare LM, NTLM hashes?
Q.5: How would you use different type of Keyloggers?
Q.6: How would you categorize password attacking techniques?
Q.7: Identify the different parts of WEP? Lets assume Data= 13, ICV =01 and KeyStream generated using the
WEP key and IV is 100110. Explain how the data will be encrypted, sent and decrypted using WEP.

You might also like