Latest Version | 2024/2025 | Already
Passed
What is ethical hacking?
✔✔ Ethical hacking is the practice of intentionally probing systems and networks to identify
vulnerabilities and improve security.
What are the primary phases of ethical hacking?
✔✔ The primary phases include reconnaissance, scanning, gaining access, maintaining access,
and covering tracks.
What is reconnaissance in ethical hacking?
✔✔ Reconnaissance involves gathering information about a target to identify potential attack
vectors before launching an attack.
What is the purpose of a port scan?
✔✔ The purpose of a port scan is to identify open ports and services running on a target system,
which can reveal vulnerabilities.
1
,What tool can be used for network scanning?
✔✔ Nmap is a commonly used tool for network scanning to discover hosts and services on a
network.
What is the difference between active and passive reconnaissance?
✔✔ Active reconnaissance involves direct interaction with the target, while passive
reconnaissance involves gathering information without direct engagement.
What is a vulnerability assessment?
✔✔ A vulnerability assessment is the process of identifying and evaluating security weaknesses
in a system or network.
What is the role of penetration testing?
✔✔ Penetration testing simulates real-world attacks to assess the security of a system and
identify vulnerabilities before they can be exploited.
What is social engineering in the context of ethical hacking?
✔✔ Social engineering involves manipulating individuals into divulging confidential
information through psychological techniques.
2
, What is a man-in-the-middle (MitM) attack?
✔✔ A man-in-the-middle attack occurs when an attacker intercepts communication between two
parties to eavesdrop or modify the information.
What is the purpose of using a VPN in ethical hacking?
✔✔ A VPN (Virtual Private Network) is used to create a secure and encrypted connection over
the internet, protecting data from interception.
What are the common types of malware?
✔✔ Common types of malware include viruses, worms, trojans, ransomware, and spyware.
What is SQL injection?
✔✔ SQL injection is a code injection technique that allows an attacker to interfere with the
queries made to a database.
What are the main objectives of an ethical hacker?
✔✔ The main objectives include identifying vulnerabilities, securing systems, protecting data,
and improving overall security posture.
3