Loading...

Interview Questions


What are the advantages and disadvantages of hacking?


Advantages Disadvantages
It can be used to foil security attacks It creates massive security issues
To plug the bugs and loopholes Get unauthorized system access
It helps to prevent data theft Stealing private information
Hacking prevents malicious attacks Violating privacy regulations

What is the difference between Asymmetric and Symmetric encryption?


Asymmetric encryption Symmetric encryption
Asymmetric encryption uses different keys for encryption and decryption. Symmetric encryption uses the same key for both encryption and decryption.
Asymmetric on the other hand is more secure but slow. Hence, a hybrid approach should be preferred. Symmetric is usually much faster but the key needs to be transferred over an unencrypted channel.

How can you avoid ARP poisoning?


ARP poisoning is a type of network attack that can be resolved through these techniques:

Using Packet filtering: Packet filters can filter out & block packets with clashing source address data.

Keeping away from trust relationship: Organizations ought to develop a protocol that depends on trust relationship as little as they can.

Utilize ARP spoofing software: Some programs assess and certify information before it is transmitted and blocks any information that is spoofed.

What can an ethical hacker do?


An ethical hacker is a computer system and networking master who systematically endeavours to infiltrate a PC framework or network for the benefit of its owners to find security vulnerabilities that a malicious hacker could potentially exploit.

Why is Python utilized for hacking?


Most broadly utilized scripting language for Hackers is Python. Python has some very critical highlights that make it especially valuable for hacking, most importantly, it has some pre-assembled libraries that give some intense functionality.

What is Cowpatty?


Cowpattyis implemented on an offline dictionary attack against WPA/WPA2 networks utilizing PSK-based verification (e.g. WPA-Personal). Cowpatty can execute an enhanced attack if a recomputed PMK document is accessible for the SSID that is being assessed.

What is Network Enumeration?


Network Enumeration is the revelation of hosts/gadgets on a network, they tend to utilize obvious disclosure protocols, for example, ICMP and SNMP to gather data, they may likewise check different ports on remote hosts for looking for surely known services trying to further recognize the function of a remote host.

Distinguish between phishing and spoofing?


 Phishing and spoofing are totally different beneath the surface. One downloads malware to your PC or network, and the other part tricks you into surrendering sensitive monetary data to a cyber-crook. Phishing is a technique for recovery, while spoofing is a method for delivery.

What is network sniffing?


System sniffing includes utilizing sniffer tools that empower real- time monitoring and analysis of data streaming over PC systems. Sniffers can be utilized for various purposes, regardless of whether it’s to steal data or manage systems. Network sniffing is utilized for ethical and unethical purposes. System administrators utilize these as system monitoring and analysis tool to analyze and avoid network-related issues, for example, traffic bottlenecks. These devices can be used a  organize cycbercrime for untrustworthy purposes, for example, character usurpation, email, delicate information hijacking, etc.

What is CIA Triad?


 CIA triad is a popular information security model. It follows three principles mentioned below:

  • Confidentiality: Keeping the information secret.
  • Integrity: Keeping the information unaltered.
  • Availability: Information is available to the authorized parties at all tim


Categories ( 117 )