Define Ethical hacking.
[3 marks]Describe the concept of legality and ethics in ethical hacking.
[4 marks]Discuss the attacker’s process versus the ethical hacker’s process with examples.
[7 marks]List and Explain two tools used for information gathering.
[3 marks]Describe the concept of enumeration in ethical hacking.
[4 marks]Discuss the techniques for scanning and foot printing with real-world tools.
[7 marks]Explain how to identify active machines in a network with example.
What is spyware?
[3 marks]Explain the difference between viruses and worms.
[4 marks]Discuss malware threats such as sniffers, session hijacking, and DoS /DDoS attacks.
[7 marks]Mention two examples of Trojan attacks.
[3 marks]Describe covert communication methods in malware.
[4 marks]Explain the importance of keeping ethical hacking legal and documented.
[7 marks]What is a firewall?
[3 marks]Explain the use of honeypots in network defense.
[4 marks]Discuss firewalls, IDS, and social engineering with real-world scenarios.
[7 marks]What is the role of security and the stack in ethical hacking?
[3 marks]Explain malware countermeasures in ethical hacking.
[4 marks]Compare different methods of session hijacking and prevention.
[7 marks]What is web application hacking? Page 1 of
[2 marks]Describe how wireless LANs can be attacked.
[4 marks]Discuss web server, application, and database hacking with countermeasures.
[7 marks]Compare hacker, cracker, and ethical hacker roles
[3 marks]Explain how ethical hacking helps organizations comply with cybersecurity regulations.
[4 marks]Discuss social engineering techniques and how they can be mitigated. Page 2 of
[2 marks]