Skip to content
#1. What is the purpose of a Certificate Authority (CA) in the context of network security?
#2. What is a common technique used to protect against SQL injection attacks?
#3. What is the main purpose of a Proxy Server in network security?
#4. Which encryption protocol is commonly used to secure web traffic?
#5. In ethical hacking, what is the purpose of a Man-in-the-Middle (MitM) attack?
#6. What is the main purpose of a Intrusion Detection System (IDS) in network security?
#7. Which type of encryption uses a single key for both encryption and decryption?
#8. What is the main goal of a social engineering attack in ethical hacking?
#9. What is the purpose of a honeynet in network security?
#10. What is the primary objective of a Red Team in ethical hacking?
#11. What is the purpose of a firewall in network security?
#12. Which of the following is an example of social engineering attack?
#13. What is the difference between a vulnerability and an exploit in ethical hacking?
#14. What is the purpose of a virtual private network (VPN) in ethical hacking?
#15. In ethical hacking, what is the term “payload” typically associated with?
#16. What is the main goal of a DDoS (Distributed Denial of Service) attack?
#17. What is a common method of protecting sensitive information during transmission over a network?
#18. What does the term “phreaking” refer to in the context of hacking?
#19. What is the purpose of a DNS (Domain Name System) in network communication?
#20. What is the primary goal of conducting a security assessment in ethical hacking?