Q2) What is IP address and Mac address?
Q3) List out some of common tools used by Ethical hackers
Q4) What are the types of the ethical hackers?Q5) What is the footprinting in ethical hacking? What is techniques used for the footprinting?Q6) Explain what is Brute Force Hack?
Q7) Explain what is the DOS (Denial of service) attack?
Q8) What are the common forms of the DOS attack
Q9) Explain what is the SQL injection?
Q10) What are the types of computer based on social engineering attacks?
Q11) what is Phishing?