Q1) Explain about Ethical Hacking?
Q2) What is IP address and Mac address?
Q3) List out some of common tools used by Ethical hackers?
Q4) What are the types of the ethical hackers?
Q5) What is the footprinting in ethical hacking? What is techniques used for the footprinting?
Q6) Explain what is Brute Force Hack?
Q7) Explain what is the DOS (Denial of service) attack?
Q8) What are the common forms of the DOS attack?
Q9) Explain what is the SQL injection?
Q10) What are the types of computer based on social engineering attacks?
Q11) what is Phishing?
Q12) Explain what is the Network Sniffing?
Q13) Explain what is the ARP Spoofing or ARP poisoning?
Q14) How you can be avoid or prevent ARP poisoning?
Q15) What is the Mac Flooding?
Q16) Explain what is the DHCP Rogue Server?
Q17) Explain what is the Cross-site scripting and what are the types of Cross site scripting?
Q18) Explain what is the Burp Suite?
Q19) what are the tools That Burp Suite consist of ?
Q20) Explain what is Pharming and Defacement?