What is footprinting in ethical hacking? What is the techniques used for footprinting?
What are the 3 types of hackers?
Who is the most dangerous hacker?
How do hackers hack passwords?
What laptops do hackers use?
What os do hackers use?
What software do hackers use?
Who is the best hacker in the world?
What tools do real hackers use?
What laptops hackers use?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?