1. What is the purpose of the scanning process in ethical hacking?
2. Name three common scanning techniques used in network reconnaissance.
3. Explain the concept of port scanning and its significance in vulnerability assessment.
4. List three popular tools used for network scanning.
5. How does scanning contribute to the overall security of a system or network?
1. Define enumeration and its role in ethical hacking.
2. Identify three different enumeration techniques used to gather information about target systems.
3. Describe the steps involved in the enumeration process.
4. Name three tools commonly used for enumeration.
5. Explain the concept of banner grabbing and its relevance to the enumeration phase.
1. What is vulnerability scanning, and how does it help identify system weaknesses?
2. Differentiate between active and passive vulnerability scanning.
3. Outline the steps involved in conducting a vulnerability scanning process.
4. Name three popular vulnerability scanning tools.
5. Discuss the importance of vulnerability databases in maintaining system security.