Total Questions : 40
Expected Time : 40 Minutes

1. In ethical hacking, why is 'Social Media Reconnaissance' performed?

2. What is the purpose of a security information and event management (SIEM) system?

3. What is the purpose of a security token?

4. What is the primary purpose of 'Packet Sniffing' in ethical hacking?

5. What is the role of a zero-knowledge proof in cryptographic protocols?

6. Why is 'Backup and Recovery Planning' essential in ethical hacking?

7. What is the purpose of a threat intelligence platform in cybersecurity?

8. In ethical hacking, what is the purpose of 'Port Scanning'?

9. Explain the concept of a covert channel in the context of network security.

10. What is the significance of the principle of least privilege in access control?

11. Explain the concept of a buffer overflow vulnerability and its exploitation.

12. Explain the concept of a side-channel attack and provide an example.

13. Why is 'Incident Response Planning' important in ethical hacking?

14. What does VPN stand for?

15. In ethical hacking, what does 'Session Hijacking' involve?

16. What is the difference between a virus and a worm in the context of malware?

17. Explain the concept of a session hijacking attack in web security.

18. What is a kernel-level exploit, and how does it differ from user-level exploits?

19. Why is 'Firewall Configuration Review' essential in ethical hacking?

20. What is the purpose of a security audit?

21. Why is 'Cross-Site Scripting (XSS)' a common vulnerability on web applications?

22. What is the primary goal of 'White-Box Penetration Testing'?

23. What is the primary purpose of network isolation in cybersecurity?

24. What is the term for exploiting a software vulnerability to gain unauthorized access?

25. Explain the concept of a return-oriented programming (ROP) chain in exploit development.

26. What is the purpose of 'Honeypots' in ethical hacking?

27. What is the role of a hardware security module (HSM) in cryptographic systems?

28. What is the purpose of a honeypot in cybersecurity?

29. What is the purpose of a firewall in a network security context?

30. What is a SQL injection attack?

31. Which is an example of a social engineering technique?

32. What is the purpose of the principle of least privilege in cybersecurity?

33. What is the first phase of ethical hacking?

34. What is the main purpose of the OWASP Top Ten?

35. What is the role of a fuzzing technique in vulnerability discovery?

36. What is the primary goal of a DDoS attack?

37. What is the difference between black hat and white hat hackers?

38. What is the primary focus of network reconnaissance in ethical hacking?

39. What is the primary goal of 'Vulnerability Assessment' in ethical hacking?

40. Explain the concept of a covert timing channel in information security.