0% found this document useful (0 votes)
29 views2 pages

Suggestion

The document outlines various aspects of ethical hacking, including its definition, importance, and differentiation from malicious hacking. It covers multiple topics such as phases of hacking, the OSI model, common vulnerabilities, penetration testing, and various hacking techniques like SQL injection and social engineering. Additionally, it discusses tools and strategies for mitigating risks and enhancing cybersecurity.

Uploaded by

ayushiscoding
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

Suggestion

The document outlines various aspects of ethical hacking, including its definition, importance, and differentiation from malicious hacking. It covers multiple topics such as phases of hacking, the OSI model, common vulnerabilities, penetration testing, and various hacking techniques like SQL injection and social engineering. Additionally, it discusses tools and strategies for mitigating risks and enhancing cybersecurity.

Uploaded by

ayushiscoding
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

Define ethical hacking and explain its importance in today’s digital world
2. how does ethical hacking differ from malicious hacking in terms of intent and legality
3. Describe phases of a successful hack
4. Define hacking into different categories
5. Explain the OSI model with a focus on how it relates to ethical hacking. Give an example of a
hacking technique that targets a specific layer
6. MAC FLOODING. How it works
7. Explain the role of IP addresses and ports in networking with respect to ethical hacking.
8. Explain the OSI model with a focus on how it relates to ethical hacking
9. What is foot printing in ethical hacking. objective. Countermeasures Against Foot printing. type
and comparison with tools
10. What is scanning? two main categories of scanning techniques. Differentiate between active
and passive scanning with examples. Tool and importance What is a vulnerability scan? How
does both help in securing a system?
11. What is a Trojan horse? Working principal of trojan or how a trojan works. What are the
common methods to deliver a Trojan to a target system? Explain how an ethical hacker can use
a virus or worm in a controlled environment to demonstrate vulnerabilities to a client.
12. Key Difference between Virus, Worms, and Trojan Horse. What is backdoor How does a
backdoor work in a system? Common Backdoor Techniques. Explain method to detect a
backdoor. Relationship Between Threats and Attacks
13. What is Google Hacking? Explain how Google Dorks can be used to find sensitive information
about a target organization
14. What are some common vulnerabilities in Linux systems? Suggest two ways to protect a Linux
system from being hacked.
15. Explain how a proxy server. How can be configured to improve both security and performance.
16. Discuss packet filtering in detail, including its advantages and limitations in securing a network.
What are the basic principles of packet filtering in a firewall?
17. Explain the purpose of a sniffer in network monitoring. Explain how sniffers work and discuss
their ethical and unethical applications in networking. Discuss the role of sniffers in ethical
hacking and how they aid in penetration testing. How can session hijacking be performed using
packet sniffing? Suggest two preventive measures.
18. Identify five common system vulnerabilities and Common Network vulnerabilities and suggest
methods to mitigate them. Define physical security and explain why it is important in IT.
19. Explain the process of hiding data using steganography and discuss common techniques for
steganography. Explain steganography with an example and describe how it differs from
encryption Syndication can be used to hide information. Compare steganography and
encryption in terms of their purpose, technique, and security.
20. What is a Distributed Denial of Service (DDoS) attack? Discuss its mechanism and one real-world
case. Describe its types and impact on a system. How DoS Attacks Work. explain Detection &
Mitigation Techniques.
21. What is social engineering? Give two common examples. Interrelationship Between Social
Engineering, Vulnerabilities, and Threats. Explain the importance of social engineering in foot
printing. What are the psychological principles behind social engineering? Explain with
examples.
22. Name three mitigation strategies for phishing attacks.
23. What is penetration testing? List and briefly explain the five phases of penetration testing.
Discuss the importance of reconnaissance in penetration testing. Provide two real-world
examples of tools used during this phase and their purposes. Differentiate between black-box,
white-box, and Gray-box penetration testing approaches. Provide one advantage and one
disadvantage for each. What is the role of a penetration tester in identifying and exploiting
vulnerabilities? Discuss the ethical considerations involved
24. Define a vulnerability in the context of cybersecurity. What are the key factors that contribute
to the existence of vulnerabilities in software systems? Explain the process of vulnerability
assessment with a neat diagram. How does it differ from penetration testing?
25. Define firewall and a honeypot. state the difference between firewall and a honeypot. Describe
how a firewall and a honeypot can work together to enhance network security Types of
Honeypots
26. What is an Intrusion Detection System. Describe Types of IDS. Compare and contrast IDS and IPS
with examples with tools used for each. Working Mechanism of IDS/IPS.
27. Explain how SQL injection can be used to bypass authentication, with an example scenario.
28. Describe a Cross-Site Scripting (XSS) attack and explain how it can be mitigated. Describe brute
force attacks
29. What is exploit writing? Outline the basic steps to create a simple exploit. What is an exploit in
cybersecurity? Give one example.
30. Discuss how Bluetooth hacking can affect IoT devices and propose security measures.
31. Explain how mobile phone hacking can exploit weak app permissions and suggest preventive
measures.
32. Describe how reverse engineering can be used to detect and patch vulnerabilities in a system.
Discuss the process of reverse engineering a software application and its relevance to ethical
hacking.
33. Discuss the importance of professional integrity in ethical hacking with reference to a real-world
scenario.
34. Name five basic ethical hacking tools and mention their primary uses. Compare and contrast the
functionalities of Wireshark and Metasploit as ethical hacking tools
35. Discuss the role of phishing in email hacking and explain how multi-factor authentication can
prevent it
36. What is the importance of documentation in incident handling? What is SMS spoofing, and how
can it be used in mobile phone hacking?

You might also like