preloader

Ethical Hacking

DWQA QuestionsCategory: HackingEthical Hacking
Sruthi Kakaraparthi Staff asked 3 years ago

1.At which layer of the OSI communication model dose bridge operate?
2.What are the types of password attack?
3.What are the Tools for wireless hacking
4.What is the preferred communications method used with systems on a bot-net?
5.Which wireless mode connects machines directly to one another, without the use of an access point?
6.Why can our regular anti-virus not trace the Trojan? What are Rootkits?
7.What are the popular tools used for ethical hacking?
8.What is DNS cache poisoning?
9.What is the primary goal of an Ethical Hacker?
10.How Data is Protected During and after Penetration Testing?