Pages

Wednesday, 23 September 2015

Frequently Asked Ethical Hacking Interview Questions and Answers

31) Mention what are the types of password cracking techniques?
The types of password cracking technique includes
    AttackBrute Forcing
    AttacksHybrid
    AttackSyllable
    AttackRule

32) Explain what are the types of hacking stages?
The types of hacking stages are:-
    Gaining AccessEscalating
    PrivilegesExecuting
    ApplicationsHiding
    FilesCovering Tracks

33) Explain what is CSRF (Cross Site Request Forgery)? How you can prevent this?
CSRF or Cross site request forgery is an attack from a malicious website that will send a request to a web application that a user is already authenticated against from a different website. To prevent CSRF you can append unpredictable challenge token to each request and associate them with user’s session.  It will ensure the developer that the request received is from a valid source.


34) What is one tool you use for ethical hacking?
WireShark is a software penetration testing tool that lets you sniff network traffic and identify rogue packets for testing and security purposes.
Have you been having trouble setting yourself apart from other candidates in your Ethical Hacking interviews? If so, you should consider earning the CEH (Certified Ethical Hacker) certification to set yourself apart from the crowd. Fill out the form below for a course syllabus and pricing information on our instructor lead, live online and self paced training options.

More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5 Page6 Page7

No comments:

Post a Comment