Skip to content		
				
		
	
				
			
	
		
			
	
		
		
			
     
    
            
    
    
                    
                #1. What is the purpose of a Certificate Authority (CA) in the context of network security? 
             
                
                #2. What is a common technique used to protect against SQL injection attacks? 
             
                
                #3. What is the main purpose of a Proxy Server in network security? 
             
                
                #4. Which encryption protocol is commonly used to secure web traffic? 
             
                
                #5. In ethical hacking, what is the purpose of a Man-in-the-Middle (MitM) attack? 
             
                
                #6. What is the main purpose of a Intrusion Detection System (IDS) in network security? 
             
                
                #7. Which type of encryption uses a single key for both encryption and decryption? 
             
                
                #8. What is the main goal of a social engineering attack in ethical hacking? 
             
                
                #9. What is the purpose of a honeynet in network security? 
             
                
                #10. What is the primary objective of a Red Team in ethical hacking? 
             
                
                #11. What is the purpose of a firewall in network security? 
             
                
                #12. Which of the following is an example of social engineering attack? 
             
                
                #13. What is the difference between a vulnerability and an exploit in ethical hacking? 
             
                
                #14. What is the purpose of a virtual private network (VPN) in ethical hacking? 
             
                
                #15. In ethical hacking, what is the term “payload” typically associated with? 
             
                
                #16. What is the main goal of a DDoS (Distributed Denial of Service) attack? 
             
                
                #17. What is a common method of protecting sensitive information during transmission over a network? 
             
                
                #18. What does the term “phreaking” refer to in the context of hacking? 
             
                
                #19. What is the purpose of a DNS (Domain Name System) in network communication? 
             
                
                #20. What is the primary goal of conducting a security assessment in ethical hacking?