Exercise

  1. What is Ethical Hacking?
  2. Describe the aim of an Ethical hacker.
  3. Describe the roles of an Ethical hacker.
  4. Describe the Black box penetration testing.
  5. Describe the White box penetration testing.
  6. Describe the Gray box penetration testing.
  7. Describe the Network service penetration testing.
  8. Describe the Web application penetration testing.
  9. Describe the Client side penetration testing.
  10. Describe the Wireless penetration testing.
  11. Describe the Social Engineering penetration testing.
  12. Describe the Physical penetration testing.
  13. Describe the responsibilities of the Ethical hackers.
  14. What are the key principles of ethical hacking?
  15. Describe the Ethical hacker skills.