Total Questions : 50
Expected Time : 50 Minutes

1. What is the purpose of a honeypot in cybersecurity?

2. What is a sandbox in the context of malware analysis?

3. Which of the following is a common method of password cracking?

4. Explain the difference between a white-box and a black-box penetration test.

5. What is the purpose of a firewall in a network security context?

6. What is the significance of the principle of least privilege in access control?

7. What is the first phase of ethical hacking?

8. What is the primary goal of 'White-Box Penetration Testing'?

9. What is the primary purpose of network isolation in cybersecurity?

10. Which type of testing assesses a system's vulnerability to social engineering attacks?

11. What is the role of a penetration tester in ethical hacking?

12. In ethical hacking, what does 'Phishing' typically involve?

13. Which cryptographic technique is commonly used for securing communication over the internet?

14. What is the primary aim of multi-factor authentication?

15. What is the purpose of the principle of least privilege in cybersecurity?

16. What is the purpose of a threat intelligence platform in cybersecurity?

17. Why is 'Security Awareness Training' crucial for organizations in ethical hacking?

18. Why is 'Incident Response Planning' important in ethical hacking?

19. What is the significance of 'Two-Factor Authentication (2FA)' in ethical hacking?

20. What is the primary purpose of a ROP (Return-Oriented Programming) attack?

21. Why is 'Backup and Recovery Planning' essential in ethical hacking?

22. What does the term 'Brute Force Attack' mean in ethical hacking?

23. Explain the concept of a side-channel attack and provide an example.

24. What is a man-in-the-middle attack?

25. What is the difference between symmetric and asymmetric encryption?

26. Explain the concept of reverse engineering in the field of cybersecurity.

27. Why is 'Password Cracking' an important aspect of ethical hacking?

28. Explain the purpose of a zero-day vulnerability and its impact on cybersecurity.

29. What role does 'Encryption' play in ethical hacking?

30. Why is 'Intrusion Detection System (IDS)' important in ethical hacking?

31. What is a kernel-level exploit, and how does it differ from user-level exploits?

32. What is the purpose of a security token?

33. In ethical hacking, what is the purpose of 'Risk Assessment'?

34. Explain the concept of a return-oriented programming (ROP) chain in exploit development.

35. What is the significance of 'OWASP' in ethical hacking and cybersecurity?

36. Explain the concept of a logical bomb in the context of malware.

37. What does the acronym CIA stand for in the context of cybersecurity?

38. What is the purpose of 'Honeypots' in ethical hacking?

39. What is the term for exploiting a software vulnerability to gain unauthorized access?

40. Why is 'Cross-Site Scripting (XSS)' a common vulnerability on web applications?

41. What does VPN stand for?

42. What is a polymorphic virus, and how does it differ from a metamorphic virus?

43. What is the difference between a virus and a worm in the context of malware?

44. Which is an example of a social engineering technique?

45. What is the purpose of SSL/TLS protocols?

46. What is the purpose of a security information and event management (SIEM) system?

47. What is the primary focus of network reconnaissance in ethical hacking?

48. Explain the purpose of secure coding practices in preventing vulnerabilities.

49. In ethical hacking, what is the significance of 'Social Engineering Attacks'?

50. What is a SQL injection attack?