- List out some of the common tools used by Ethical hackers?
- What is footprinting in ethical hacking? What is the techniques used for footprinting?
- Explain what is Brute Force Hack?
- what is DOS (Denial of service) attack?
- Explain what is SQL injection?
- What is Network Sniffing?
- what is ARP Spoofing or ARP poisoning?
- What is Mac Flooding?
- Explain what is DHCP Rogue Server?
- what is Cross-site scripting and what are the types of Cross site scripting?