0% found this document useful (0 votes)
16 views3 pages

Ethical Hacking Questionbank

Uploaded by

athulatk6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views3 pages

Ethical Hacking Questionbank

Uploaded by

athulatk6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

BVOCAS353 -Ethical Hacking Techniques Question bank

Two marks Question


1. What is Ethical Hacking?
2. What is the difference between Ethical Hacking and Cybersecurity?
3. What are the advantages and disadvantages of hacking?
4. What is the difference between Asymmetric and Symmetric encryption?
5. How can you avoid ARP poisoning?
6. What can an ethical hacker do?
7. Why is Python utilized for hacking?
8. What is Network Enumeration?
9. Distinguish between phishing and spoofing?
10.What is network sniffing?
11.What is network security, and what are its types?
12.What is the difference between encryption and hashing?
13.What is the difference between VA and PT?
14.What is data leakage? How will you detect and prevent it?
15.What is sniffing? Explain its types in Ethical Hacking.
16.What is Defense in Depth
17.What is penetration testing? Mention some popular penetration testing
tools.
18.What is network traffic monitoring and analysis?
19.What is meant by spoofing attack?
20.What are the different types of spoofing?
21.What is active and passive reconnaissance?
22.Differentiate Between a MAC and an IP Address?
Module-1
1)Explain briefly what is hacking?
2)Who is hacker? List the different of hacker
3)List the different types of hacking and explain each type
4)What are the advantages of hacking and disadvantages of hacking?
5)what is network penetration test?
6)what are the different network penetration testing and explain?
7)Explain the basic of network and explain with diagram?
8)Explain pre-connection attack?
9)What are the basic steps to be followed to perform pre-connection attack?
10)Explain deauthticated the wireless client with diagram

Module-2
1)Explain WEP introduction with diagram?
2)Explain WEP cracking?
3)Explain fake authentication attack?
4)Explain ARP request reply attack?

Module-3
1)Explain server side and client
2) Explain post exploitation
3)Explain server-side attack basics
4)Explain server-side attacks and meta exploit basics
5)Explain two main types of payloads
6)Explain MSFC analysis
7)Explain MSFC scan
8)List the steps for installing MFSC
9)Explain exploiting a code execution vulnerability
10)List the different basic commands in meta exploit

Module-4
1. Explain in-depth transport and link layers
2. Explain TCP
3. Explain TCP-3-way handshake.
4. Explain on how TCP engages in communication.
5. Explain Spoofing Traffic
6. Explain UDP
7. Explain switched Network
8. Explain ARP & VLAN
9. Explain cyber security firewalls.
10.Explain content & Application filtering.
11.Explain content control.
12.Explain decrypting traffic.
13.Explain unknown traffic.
14.Explain cyber security web application.
15.List the different HTTP header and explain.
16. Explain Network Mapping.
17.Explain TCP port scanning & UDP port scanning
18.Explain SQL injection.
19.Explain HTML encoding.

You might also like