SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
ETHICAL HACKING
Interview Questions and Answers
Ethical hacking is an exciting career opportunity for individuals with
excellent problem-solving skills and a passion for information security.
Ethical hackers are responsible for safeguarding the critical infrastructure
of the organization. They organize penetration tests to identify the
vulnerabilities and help the organization take necessary measures to
prevent possible cyber-attacks. There has been an increased demand for
Ethical hackers in government agencies ( military and intelligence
agencies) and private organizations in recent times. To become an
ethical hacker requires a sound knowledge of networking and hacking
systems.Ethical hacking is an exciting career opportunity for individuals
with excellent problem-solving skills and a passion for information
security. Ethical hackers are responsible for safeguarding the critical
infrastructure of the organization. They organize penetration tests to
identify the vulnerabilities and help the organization take necessary
measures to prevent possible cyber-attacks. There has been an
increased demand for Ethical hackers in government agencies ( military
and intelligence agencies) and private organizations in recent times. To
become an ethical hacker requires a sound knowledge of networking and
hacking systems.
www.infosectrain.com | sales@infosectrain.com
This section outlines some of the frequently asked questions in an Ethical
hacking job interview.
Top Cybersecurity Interview Questions
An ethical hacker needs to stay updated about the latest vulnera-
bilities, exploits, and attacks. Social media handles such as Twitter
can be the quickest way to get information. You can also mention
Google alert, Reddit, tech news sites, and channels on slack or
discord communication platforms
What cybersecurity news sources do you
prefer to keep yourself updated
1
This question is often asked in the interview to test your
methodology and approach to conducting a penetration test. The
˜ˡ˧˘˥˩˜˘˪˘˥˦˖˔ˡ˦˛ˢˢ˧˧˛˜˦ˤ˨˘˦˧˜ˢˡˣ˥ˢ˩˜˗˜ˡ˚˦ˣ˘˖˜Ѓ˖˦˖˘ˡ˔˥˜ˢ˦
and parameters. Sometimes, they will deliberately skip the details.
So don’t restrain yourself from asking for additional information.
Remember that external penetration testing starts with the pre
engagement phase. A penetration tester sits with the client,
determines the engagement’s scope, and signs a non-disclosure
agreement with the client. Before starting the testing process,
verify the IP addresses and domain names provided by the clients.
Explain your approach, tools, and methods thoroughly.
How would you conduct an external
penetration test
2
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
Following are the steps performed by hackers to take down the
system or network
Reconnaissance: In this step, hackers try to collect all the informa-
tion about the target.
Scanning or Enumeration: In this step, hackers use the gathered
information to scan for the target’s network and system vulnerabili-
ties.
Gaining Access: After scanning and enumeration, hackers gain
access to the target machine by exploiting vulnerabilities.
Maintaining access: Once access is obtained to the system, hack-
ers install malicious software to keep access in the future.
Clearing the tracks: In this step, hackers destroy all the pieces of
evidence to remain undetected from the team of digital forensic.
What are the steps performed by hackers
to take down a system or network
5
Grabbing the banner using a telnet session is the quickest and
easiest way to identify the target’s operating system.
What shortest method would you use to
identify the operating system of your target
3
In the vulnerability assessment, Ethical hackers identify the vulnera-
˕˜˟˜˧˜˘˦˔ˡ˗Ѓ˫˧˛˘ˠ˧ˢˣ˥˘˩˘ˡ˧ˣˢ˦˦˜˕˟˘˖ˬ˕˘˥˔˧˧˔˖˞˦ʡ˂ˡ˧˛˘ˢ˧˛˘˥
hand, penetration testing is a process of detecting vulnerabilities
and exploiting them to analyze a real cyber attack’s implications.
What is the difference between vulnerability
assessment and penetration testing
4
Phishing is a type of social engineering attack in which Attackers
˖˥˘˔˧˘˔ˡ˨˥˚˘ˡ˖ˬ˨˦˜ˡ˚˧˛˥˘˔˧˦ʟЃˡ˔ˡ˖˜˔˟˜ˡ˖˘ˡ˧˜˩˘˦ʟ˔ˡ˗˜ˠˣ˘˥ʠ
sonation of an authoritative organization to prompt a user to give
their sensitive information, including the credit card details, user-
names, and passwords
What is a Phishing attack
6
ˆˡ˜˙Ѓˡ˚˥˘˙˘˥˦˧ˢˠˢˡ˜˧ˢ˥˜ˡ˚˔ˡ˗˔ˡ˔˟ˬ˭˜ˡ˚˜ˡ˖ˢˠ˜ˡ˚˔ˡ˗ˢ˨˧˚ˢ˜ˡ˚
data packets over a network. Packet sniffers are used to capturing
˧˛˘˗˔˧˔ˣ˔˖˞˘˧˦ʡˀˢ˧˜˩˘˦˕˘˛˜ˡ˗˦ˡ˜˙Ѓˡ˚˔˧˧˔˖˞˦˔˥˘˦˧˘˔˟˜ˡ˚˕˔ˡ˞
account information, getting usernames and passwords, and iden-
tity theft.
ˊ˛˔˧˜˦˔˦ˡ˜˙Ѓˡ˚˔˧˧˔˖˞
7
Blind SQL injection, when attackers insert a malicious query as
input, the database does not show any error. Therefore it becomes
˗˜˙Ѓ˖˨˟˧˙ˢ˥˧˛˘ˠ˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˘˫ˣ˟ˢ˜˧˧˛˘˩˨˟ˡ˘˥˔˕˜˟˜˧ˬʡ
The best method to detect Blind SQLi is Time based detection. Data-
bases including MySQL, MS-SQL use a function for delays. The
attacker inserts the sleep() function in a query. The slower
response from the database would mean the query got executed
successfully, and Blind SQLi vulnerability is present on the web
page.
What is Blind SQL injection? How would
you detect a Blind SQLi vulnerability on
a web page
8
www.infosectrain.com | sales@infosectrain.com
The Distributed Denial of Services (DDOS) is an attack in which
˔ˡ˔˧˧˔˖˞˘˥Єˢˢ˗˦˔ˡ˘˧˪ˢ˥˞ʟ˦˘˥˩˘˥ʟˢ˥˪˘˕˦˜˧˘˪˜˧˛˨˦˘˟˘˦˦
˧˥˔˙Ѓ˖˦ˢ˧˛˔˧˜˧˕˘˖ˢˠ˘˦˜ˡˢˣ˘˥˔˕˟˘˙ˢ˥˧˛˘˜ˡ˧˘ˡ˗˘˗˨˦˘˥ʡˇ˛˘
˧˥˔˙Ѓ˖ˠ˔ˬ˖ˢˡ˧˔˜ˡ˜ˡ˖ˢˠ˜ˡ˚˥˘ˤ˨˘˦˧˦˙ˢ˥˖ˢˡˡ˘˖˧˜ˢˡˢ˥˙˔˞˘
data packets. There are three types of DDOS attacks.
Volume-based DDoS attack
Protocol DDoS attack
Application DDoS attack
What do you understand by the DDoS
attack? What are its types
9
SQL injection is a method to hack a web application. In this
method, the attacker executes malicious SQL statements to
take control of the database server. Attackers use SQL
vulnerabilities to retrieve or modify the data of the SQL database.
The following are the types of SQL injections:
What is an SQL injection attack
10
www.infosectrain.com | sales@infosectrain.com
Error-based SQL injection
Blind SQL injection
Union-based SQL injection
A good vulnerability assessment report needs to be detailed and
basic in nature so that even stakeholders having no technical
background can easily understand it. The report should contain
˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˥˘˚˔˥˗˜ˡ˚˧˛˘˩˨˟ˡ˘˥˔˕˜˟˜˧˜˘˦ʟ˛ˢ˪ˬˢ˨Ѓˡ˗˧˛˘ˠʟ˔ˡ˗
their impact on the enterprise’s business environment. It should
˔˟˦ˢ˘˫ˣ˟˔˜ˡ˧˛˘˩˔˟˨˔˕˟˘˦ˢ˟˨˧˜ˢˡ˦˧ˢЃ˫˧˛˘˩˨˟ˡ˘˥˔˕˜˟˜˧˜˘˦˔ˡ˗
mitigate potential risks
What are the characteristics of a good
vulnerability assessment report
11
ʶˢ˪ˣ˔˧˧ˬ˜˦˔˧ˢˢ˟˧˛˔˧˖˔ˡ˜ˠˣ˟˘ˠ˘ˡ˧˔ˡˢ˙Є˜ˡ˘˗˜˖˧˜ˢʠ
nary-based attack on the WPA/WPA2 networks that are using
PSK- based authentication.
What is cow patty
12
keylogger is a surveillance technology used by an attacker on a
target computer to record and monitor keystrokes struck by the
user. Keyloggers record the sensitive information typed by the
target.
What is a keylogger
13
ˆˣˢˢЃˡ˚˜˦˔˦˖˔ˠ˜ˡ˪˛˜˖˛˔ˡ˔˧˧˔˖˞˘˥˜ˠˣ˘˥˦ˢˡ˔˧˘˦˔
legitimate source or known contact of the target to obtain
sensitive information. Hackers can use this information for illegal
activities such as identity theft.
ˊ˛˔˧˜˦˦ˣˢˢЃˡ˚
14
www.infosectrain.com | sales@infosectrain.com
ʹˢ˟˟ˢ˪˜ˡ˚˔˥˘˦ˢˠ˘ˢ˙˧˛˘˥˘ˡˢ˪ˡ˘˗˦ˣˢˢЃˡ˚˔˧˧˔˖˞˦
ʷˁˆ˖˔˖˛˘ˣˢ˜˦ˢˡ˜ˡ˚˜˦˔˟˦ˢ˞ˡˢ˪ˡ˔˦ʷˁˆˆˣˢˢЃˡ˚ʡʼ˧˜˦˔ˡ
attack in which an attacker takes advantage of the vulnerabili-
ties existing in the DNS (Domain name system) to divert the
˧˥˔˙Ѓ˖˙˥ˢˠ˧˛˘ˢ˥˜˚˜ˡ˔˟˦˘˥˩˘˥˧ˢ˔˙˔˞˘ˢˡ˘ʡ
What is DNS cache poisoning
15
www.infosectrain.com | sales@infosectrain.com
ʷˁˆ˦˘˥˩˘˥˦ˣˢˢЃˡ˚
ʴ˅˃˦ˣˢˢЃˡ˚
ˊ˘˕˦˜˧˘˦ˣˢˢЃˡ˚
ʶ˔˟˟˘˥ʼʷ˦ˣˢˢЃˡ˚

Weitere ähnliche Inhalte

Was ist angesagt?

Sharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkSharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkMITRE - ATT&CKcon
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Siber Güvenlik ve Etik Hacking Sunu - 13
Siber Güvenlik ve Etik Hacking Sunu - 13Siber Güvenlik ve Etik Hacking Sunu - 13
Siber Güvenlik ve Etik Hacking Sunu - 13Murat KARA
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE - ATT&CKcon
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
SecurityOnion ile Ağ güvenliğini İzlemek
SecurityOnion ile Ağ güvenliğini İzlemekSecurityOnion ile Ağ güvenliğini İzlemek
SecurityOnion ile Ağ güvenliğini İzlemekFurkan Çalışkan
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Web application security the fast guide
Web application security the fast guideWeb application security the fast guide
Web application security the fast guideDr.Sami Khiami
 

Was ist angesagt? (20)

Sharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkSharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK Framework
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Siber Güvenlik ve Etik Hacking Sunu - 13
Siber Güvenlik ve Etik Hacking Sunu - 13Siber Güvenlik ve Etik Hacking Sunu - 13
Siber Güvenlik ve Etik Hacking Sunu - 13
 
Securing Remote Access
Securing Remote AccessSecuring Remote Access
Securing Remote Access
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
SecurityOnion ile Ağ güvenliğini İzlemek
SecurityOnion ile Ağ güvenliğini İzlemekSecurityOnion ile Ağ güvenliğini İzlemek
SecurityOnion ile Ağ güvenliğini İzlemek
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Web application security the fast guide
Web application security the fast guideWeb application security the fast guide
Web application security the fast guide
 

Ähnlich wie Ethical Hacking Interview Questions and Answers.pdf

Ethical hacking interview questions and answers
Ethical hacking interview questions and answersEthical hacking interview questions and answers
Ethical hacking interview questions and answersShivamSharma909
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-studyhomeworkping4
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfinfosec train
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUUniversity of Essex
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 

Ähnlich wie Ethical Hacking Interview Questions and Answers.pdf (20)

Ethical hacking interview questions and answers
Ethical hacking interview questions and answersEthical hacking interview questions and answers
Ethical hacking interview questions and answers
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdf
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 

Mehr von ShivamSharma909

CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfShivamSharma909
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...ShivamSharma909
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfShivamSharma909
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfShivamSharma909
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseShivamSharma909
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitShivamSharma909
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questionsShivamSharma909
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questionsShivamSharma909
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystShivamSharma909
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesShivamSharma909
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesShivamSharma909
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingShivamSharma909
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304ShivamSharma909
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 

Mehr von ShivamSharma909 (20)

CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Kürzlich hochgeladen (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Ethical Hacking Interview Questions and Answers.pdf

  • 2. Ethical hacking is an exciting career opportunity for individuals with excellent problem-solving skills and a passion for information security. Ethical hackers are responsible for safeguarding the critical infrastructure of the organization. They organize penetration tests to identify the vulnerabilities and help the organization take necessary measures to prevent possible cyber-attacks. There has been an increased demand for Ethical hackers in government agencies ( military and intelligence agencies) and private organizations in recent times. To become an ethical hacker requires a sound knowledge of networking and hacking systems.Ethical hacking is an exciting career opportunity for individuals with excellent problem-solving skills and a passion for information security. Ethical hackers are responsible for safeguarding the critical infrastructure of the organization. They organize penetration tests to identify the vulnerabilities and help the organization take necessary measures to prevent possible cyber-attacks. There has been an increased demand for Ethical hackers in government agencies ( military and intelligence agencies) and private organizations in recent times. To become an ethical hacker requires a sound knowledge of networking and hacking systems. www.infosectrain.com | sales@infosectrain.com
  • 3. This section outlines some of the frequently asked questions in an Ethical hacking job interview. Top Cybersecurity Interview Questions An ethical hacker needs to stay updated about the latest vulnera- bilities, exploits, and attacks. Social media handles such as Twitter can be the quickest way to get information. You can also mention Google alert, Reddit, tech news sites, and channels on slack or discord communication platforms What cybersecurity news sources do you prefer to keep yourself updated 1 This question is often asked in the interview to test your methodology and approach to conducting a penetration test. The ˜ˡ˧˘˥˩˜˘˪˘˥˦˖˔ˡ˦˛ˢˢ˧˧˛˜˦ˤ˨˘˦˧˜ˢˡˣ˥ˢ˩˜˗˜ˡ˚˦ˣ˘˖˜Ѓ˖˦˖˘ˡ˔˥˜ˢ˦ and parameters. Sometimes, they will deliberately skip the details. So don’t restrain yourself from asking for additional information. Remember that external penetration testing starts with the pre engagement phase. A penetration tester sits with the client, determines the engagement’s scope, and signs a non-disclosure agreement with the client. Before starting the testing process, verify the IP addresses and domain names provided by the clients. Explain your approach, tools, and methods thoroughly. How would you conduct an external penetration test 2 www.infosectrain.com | sales@infosectrain.com
  • 4. www.infosectrain.com | sales@infosectrain.com Following are the steps performed by hackers to take down the system or network Reconnaissance: In this step, hackers try to collect all the informa- tion about the target. Scanning or Enumeration: In this step, hackers use the gathered information to scan for the target’s network and system vulnerabili- ties. Gaining Access: After scanning and enumeration, hackers gain access to the target machine by exploiting vulnerabilities. Maintaining access: Once access is obtained to the system, hack- ers install malicious software to keep access in the future. Clearing the tracks: In this step, hackers destroy all the pieces of evidence to remain undetected from the team of digital forensic. What are the steps performed by hackers to take down a system or network 5 Grabbing the banner using a telnet session is the quickest and easiest way to identify the target’s operating system. What shortest method would you use to identify the operating system of your target 3 In the vulnerability assessment, Ethical hackers identify the vulnera- ˕˜˟˜˧˜˘˦˔ˡ˗Ѓ˫˧˛˘ˠ˧ˢˣ˥˘˩˘ˡ˧ˣˢ˦˦˜˕˟˘˖ˬ˕˘˥˔˧˧˔˖˞˦ʡ˂ˡ˧˛˘ˢ˧˛˘˥ hand, penetration testing is a process of detecting vulnerabilities and exploiting them to analyze a real cyber attack’s implications. What is the difference between vulnerability assessment and penetration testing 4
  • 5. Phishing is a type of social engineering attack in which Attackers ˖˥˘˔˧˘˔ˡ˨˥˚˘ˡ˖ˬ˨˦˜ˡ˚˧˛˥˘˔˧˦ʟЃˡ˔ˡ˖˜˔˟˜ˡ˖˘ˡ˧˜˩˘˦ʟ˔ˡ˗˜ˠˣ˘˥ʠ sonation of an authoritative organization to prompt a user to give their sensitive information, including the credit card details, user- names, and passwords What is a Phishing attack 6 ˆˡ˜˙Ѓˡ˚˥˘˙˘˥˦˧ˢˠˢˡ˜˧ˢ˥˜ˡ˚˔ˡ˗˔ˡ˔˟ˬ˭˜ˡ˚˜ˡ˖ˢˠ˜ˡ˚˔ˡ˗ˢ˨˧˚ˢ˜ˡ˚ data packets over a network. Packet sniffers are used to capturing ˧˛˘˗˔˧˔ˣ˔˖˞˘˧˦ʡˀˢ˧˜˩˘˦˕˘˛˜ˡ˗˦ˡ˜˙Ѓˡ˚˔˧˧˔˖˞˦˔˥˘˦˧˘˔˟˜ˡ˚˕˔ˡ˞ account information, getting usernames and passwords, and iden- tity theft. ˊ˛˔˧˜˦˔˦ˡ˜˙Ѓˡ˚˔˧˧˔˖˞ 7 Blind SQL injection, when attackers insert a malicious query as input, the database does not show any error. Therefore it becomes ˗˜˙Ѓ˖˨˟˧˙ˢ˥˧˛˘ˠ˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˘˫ˣ˟ˢ˜˧˧˛˘˩˨˟ˡ˘˥˔˕˜˟˜˧ˬʡ The best method to detect Blind SQLi is Time based detection. Data- bases including MySQL, MS-SQL use a function for delays. The attacker inserts the sleep() function in a query. The slower response from the database would mean the query got executed successfully, and Blind SQLi vulnerability is present on the web page. What is Blind SQL injection? How would you detect a Blind SQLi vulnerability on a web page 8 www.infosectrain.com | sales@infosectrain.com
  • 6. The Distributed Denial of Services (DDOS) is an attack in which ˔ˡ˔˧˧˔˖˞˘˥Єˢˢ˗˦˔ˡ˘˧˪ˢ˥˞ʟ˦˘˥˩˘˥ʟˢ˥˪˘˕˦˜˧˘˪˜˧˛˨˦˘˟˘˦˦ ˧˥˔˙Ѓ˖˦ˢ˧˛˔˧˜˧˕˘˖ˢˠ˘˦˜ˡˢˣ˘˥˔˕˟˘˙ˢ˥˧˛˘˜ˡ˧˘ˡ˗˘˗˨˦˘˥ʡˇ˛˘ ˧˥˔˙Ѓ˖ˠ˔ˬ˖ˢˡ˧˔˜ˡ˜ˡ˖ˢˠ˜ˡ˚˥˘ˤ˨˘˦˧˦˙ˢ˥˖ˢˡˡ˘˖˧˜ˢˡˢ˥˙˔˞˘ data packets. There are three types of DDOS attacks. Volume-based DDoS attack Protocol DDoS attack Application DDoS attack What do you understand by the DDoS attack? What are its types 9 SQL injection is a method to hack a web application. In this method, the attacker executes malicious SQL statements to take control of the database server. Attackers use SQL vulnerabilities to retrieve or modify the data of the SQL database. The following are the types of SQL injections: What is an SQL injection attack 10 www.infosectrain.com | sales@infosectrain.com Error-based SQL injection Blind SQL injection Union-based SQL injection
  • 7. A good vulnerability assessment report needs to be detailed and basic in nature so that even stakeholders having no technical background can easily understand it. The report should contain ˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˥˘˚˔˥˗˜ˡ˚˧˛˘˩˨˟ˡ˘˥˔˕˜˟˜˧˜˘˦ʟ˛ˢ˪ˬˢ˨Ѓˡ˗˧˛˘ˠʟ˔ˡ˗ their impact on the enterprise’s business environment. It should ˔˟˦ˢ˘˫ˣ˟˔˜ˡ˧˛˘˩˔˟˨˔˕˟˘˦ˢ˟˨˧˜ˢˡ˦˧ˢЃ˫˧˛˘˩˨˟ˡ˘˥˔˕˜˟˜˧˜˘˦˔ˡ˗ mitigate potential risks What are the characteristics of a good vulnerability assessment report 11 ʶˢ˪ˣ˔˧˧ˬ˜˦˔˧ˢˢ˟˧˛˔˧˖˔ˡ˜ˠˣ˟˘ˠ˘ˡ˧˔ˡˢ˙Є˜ˡ˘˗˜˖˧˜ˢʠ nary-based attack on the WPA/WPA2 networks that are using PSK- based authentication. What is cow patty 12 keylogger is a surveillance technology used by an attacker on a target computer to record and monitor keystrokes struck by the user. Keyloggers record the sensitive information typed by the target. What is a keylogger 13 ˆˣˢˢЃˡ˚˜˦˔˦˖˔ˠ˜ˡ˪˛˜˖˛˔ˡ˔˧˧˔˖˞˘˥˜ˠˣ˘˥˦ˢˡ˔˧˘˦˔ legitimate source or known contact of the target to obtain sensitive information. Hackers can use this information for illegal activities such as identity theft. ˊ˛˔˧˜˦˦ˣˢˢЃˡ˚ 14 www.infosectrain.com | sales@infosectrain.com
  • 8. ʹˢ˟˟ˢ˪˜ˡ˚˔˥˘˦ˢˠ˘ˢ˙˧˛˘˥˘ˡˢ˪ˡ˘˗˦ˣˢˢЃˡ˚˔˧˧˔˖˞˦ ʷˁˆ˖˔˖˛˘ˣˢ˜˦ˢˡ˜ˡ˚˜˦˔˟˦ˢ˞ˡˢ˪ˡ˔˦ʷˁˆˆˣˢˢЃˡ˚ʡʼ˧˜˦˔ˡ attack in which an attacker takes advantage of the vulnerabili- ties existing in the DNS (Domain name system) to divert the ˧˥˔˙Ѓ˖˙˥ˢˠ˧˛˘ˢ˥˜˚˜ˡ˔˟˦˘˥˩˘˥˧ˢ˔˙˔˞˘ˢˡ˘ʡ What is DNS cache poisoning 15 www.infosectrain.com | sales@infosectrain.com ʷˁˆ˦˘˥˩˘˥˦ˣˢˢЃˡ˚ ʴ˅˃˦ˣˢˢЃˡ˚ ˊ˘˕˦˜˧˘˦ˣˢˢЃˡ˚ ʶ˔˟˟˘˥ʼʷ˦ˣˢˢЃˡ˚