Update | 2024/2025 | 100% Pass
What is the primary goal of ethical hacking?
✔✔ The primary goal of ethical hacking is to identify vulnerabilities in systems and networks to
enhance security before malicious attackers can exploit them.
What are the phases of a penetration test?
✔✔ The phases include planning, reconnaissance, scanning, gaining access, maintaining access,
and analysis.
What is the difference between vulnerability assessment and penetration testing?
✔✔ Vulnerability assessment identifies and prioritizes vulnerabilities, while penetration testing
actively exploits those vulnerabilities to determine the level of risk.
What is the purpose of footprinting in ethical hacking?
✔✔ Footprinting is the process of gathering information about a target system to understand its
architecture and potential vulnerabilities.
1
,What is a DNS zone transfer?
✔✔ A DNS zone transfer is a method of replicating DNS databases across DNS servers, which
can be exploited to gain information about domain names and IP addresses.
What is a brute force attack?
✔✔ A brute force attack is a method used to guess passwords or encryption keys by
systematically trying all possible combinations until the correct one is found.
What role does social engineering play in cybersecurity?
✔✔ Social engineering manipulates individuals into divulging confidential information, often
bypassing technical security measures.
What is SQL injection, and how can it be prevented?
✔✔ SQL injection is an attack that allows an attacker to execute arbitrary SQL code on a
database. It can be prevented by using prepared statements and input validation.
What are some common types of malware?
✔✔ Common types of malware include viruses, worms, trojans, ransomware, and spyware.
2
,What is the significance of using strong passwords?
✔✔ Strong passwords enhance security by making it more difficult for attackers to guess or
crack them, reducing the risk of unauthorized access.
What is the function of a firewall?
✔✔ A firewall monitors and controls incoming and outgoing network traffic based on
predetermined security rules.
What is cross-site scripting (XSS)?
✔✔ Cross-site scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts
into web pages viewed by users.
What is the difference between a white hat hacker and a black hat hacker?
✔✔ A white hat hacker conducts ethical hacking to improve security, while a black hat hacker
exploits vulnerabilities for malicious purposes.
What is the purpose of encryption?
✔✔ Encryption protects sensitive data by converting it into an unreadable format that can only
be reverted to its original form with the correct key.
3
, What is a zero-day vulnerability?
✔✔ A zero-day vulnerability is a security flaw that is unknown to the vendor and has not yet
been patched, making it particularly dangerous.
How can an organization mitigate the risk of phishing attacks?
✔✔ Organizations can mitigate phishing risks by providing employee training, implementing
email filtering, and using multi-factor authentication.
What is the CIA triad in cybersecurity?
✔✔ The CIA triad refers to the principles of Confidentiality, Integrity, and Availability, which
are fundamental to information security.
What tools are commonly used for network scanning?
✔✔ Common tools include Nmap, Nessus, and Wireshark, which help identify active devices
and their open ports on a network.
What is the purpose of a security policy?
4