and Answers | Latest Version | 2024/2025
| Graded A+
What is a footprinting process?
✔✔ Footprinting is the process of gathering information about a target to identify potential
attack vectors before an actual attack.
What is the significance of using strong passwords?
✔✔ Strong passwords are significant because they help protect accounts from unauthorized
access and minimize the risk of breaches.
What does the term “social engineering” refer to in cybersecurity?
✔✔ Social engineering refers to manipulation techniques that exploit human psychology to gain
confidential information.
What is a denial-of-service (DoS) attack?
✔✔ A denial-of-service attack aims to make a service unavailable by overwhelming it with
traffic or requests.
1
, What are common methods used in phishing attacks?
✔✔ Common methods include deceptive emails, fake websites, and instant messages designed to
trick users into revealing personal information.
What is the role of a firewall in network security?
✔✔ A firewall acts as a barrier between trusted and untrusted networks, controlling incoming
and outgoing traffic based on security rules.
What is a keylogger?
✔✔ A keylogger is a type of malware that records keystrokes to capture sensitive information,
such as usernames and passwords.
What is SQL injection, and why is it a concern?
✔✔ SQL injection is a code injection technique that allows attackers to manipulate database
queries, potentially compromising sensitive data.
What is the purpose of penetration testing?
✔✔ The purpose of penetration testing is to simulate real-world attacks to identify and exploit
vulnerabilities before malicious hackers do.
2