1. : What is ethical hacking?
(A) Hacking for personal gain
(B) Unauthorized access to steal data
(C) Authorized hacking to find security weaknesses
(D) Creating malware programs
2. : Which of the following best defines penetration testing?
(A) Testing computer speed
(B) Simulating cyberattacks to identify vulnerabilities in systems
(C) Writing programming code
(D) Installing antivirus software
3. : Who authorizes ethical hackers to perform penetration testing?
(A) Hackers themselves
(B) Government only
(C) The organization owning the system
(D) Internet Service Providers
4. : Which of the following is NOT a type of ethical hacker?
(A) White Hat Hacker
(B) Black Hat Hacker
(C) Grey Hat Hacker
(D) Red Team Hacker
5. : Which phase of ethical hacking involves collecting information about the target system?
(A) Exploitation
(B) Reconnaissance
(C) Reporting
(D) Patching
6. : In penetration testing, which type of test is performed without prior knowledge of the system?
(A) White-box testing
(B) Black-box testing
(C) Gray-box testing
(D) Unit testing
7. : Which tool is commonly used for penetration testing?
(A) MS Word
(B) Metasploit
(C) Photoshop
(D) Chrome
8. : What is the main objective of ethical hacking?
(A) To harm computer systems
(B) To secure systems by identifying and fixing vulnerabilities
(C) To steal confidential information
(D) To crash websites
9. : Which hacker type uses hacking for malicious purposes?
(A) White Hat
(B) Grey Hat
(C) Black Hat
(D) Ethical Hacker
10. : After penetration testing, what is the most important final step?
(A) Selling vulnerabilities to competitors
(B) Reporting findings and suggesting security fixes
(C) Ignoring the results
(D) Removing security patches