| Latest Update | 2024/2025 | Already
Passed
What is the first step in ethical hacking?
✔✔ The first step in ethical hacking is reconnaissance, where information about the target
system is gathered.
How does active reconnaissance differ from passive reconnaissance?
✔✔ Active reconnaissance involves interacting directly with the target system, while passive
reconnaissance gathers information without direct interaction.
What tool is commonly used for network discovery?
✔✔ Nmap is commonly used for network discovery and scanning.
What is the purpose of footprinting?
✔✔ Footprinting aims to gather as much information as possible about a target system or
network before launching an attack.
1
,What is open-source intelligence (OSINT)?
✔✔ OSINT is information collected from publicly available sources to aid in the reconnaissance
phase of ethical hacking.
What is the role of scanning in ethical hacking?
✔✔ Scanning identifies open ports, services, and potential vulnerabilities in a target system.
How can social engineering attacks be prevented?
✔✔ Social engineering attacks can be prevented through user education, strong policies, and
multi-factor authentication.
What is enumeration in ethical hacking?
✔✔ Enumeration is the process of extracting more detailed information about a target, such as
user accounts, shares, and services.
What is a port scan?
✔✔ A port scan checks for open ports on a network or system to determine which services are
active.
2
, What is a vulnerability scanner?
✔✔ A vulnerability scanner is a tool used to identify security weaknesses in a network or
system.
How does a brute-force attack work?
✔✔ A brute-force attack systematically tries different combinations of credentials until the
correct one is found.
What is a man-in-the-middle (MITM) attack?
✔✔ A man-in-the-middle attack occurs when an attacker intercepts communication between two
parties to steal or alter data.
What is the purpose of using a proxy in ethical hacking?
✔✔ A proxy is used to hide the hacker’s identity by routing traffic through a different IP
address.
What is banner grabbing?
✔✔ Banner grabbing is a technique used to gather information about a system's services by
retrieving the banner message from open ports.
3