Certified Ethical Hacker Interview Questions with Answers
Give an explanation for what is Ethical Hacking?
Ethical Hacking is while someone is authorized to hacks the gadget with the permission of the product owner to locate weak point in a machine and later restore them.
What’s the difference among IP cope with and Mac deal with?
IP deal with: To each tool IP cope with is assigned, in order that device can be positioned at the community. In other phrases IP address is like your postal cope with, in which each person who is aware of your postal cope with can ship you a letter.
MAC (device get admission to manipulate) cope with: A MAC cope with is a completely unique serial wide variety assigned to each network interface on every tool. Mac cope with is like your physical mail container, best your postal provider (community router) can identify it and you may change it with the aid of getting a new mailbox (community card) at any time and slapping your name (IP cope with) on it.
listing out some of the common gear utilized by moral hackers?
John The Ripper
Explain what’s Brute force Hack?
Explain what’s Sql injection?
Sql is one of the method used to thieve statistics from organizations, it is a fault created in the software code. square injection occurs while you inject the content material into a square query string and the end result mode content into a sq. question string, and the end result modifies the syntax of your question in methods you did now not intend.
Explain what’s network Sniffing?
A community sniffer video display units statistics flowing over pc community hyperlinks. by means of allowing you to seize and look at the packet stage records on your network, sniffer tool can help you to find community troubles. Sniffers can be used for both stealing statistics off a community and additionally for legitimate community control.
Give an explanation for what is Pharming and Defacement?
Pharming: on this method the attacker compromises the DNS ( domain call system) servers or on the person computer in order that site visitors is directed to a malicious website
Defacement: in this technique the attacker replaces the corporation website with a exceptional web page. It includes the hackers name, pictures and may even include messages.
Explain how you can stop your website getting hacked?
By adapting following method you can stop your website from getting hacked
Sanitizing and Validating users parameters: By Sanitizing and Validating user parameters before submitting them to the database can reduce the chances of being attacked by SQL injection
Using Firewall: Firewall can be used to drop traffic from suspicious IP address if attack is a simple DOS
Encrypting the Cookies: Cookie or Session poisoning can be prevented by encrypting the content of the cookies, associating cookies with the client IP address and timing out the cookies after some time
Validating and Verifying user input : This approach is ready to prevent form tempering by verifying and validating the user input before processing it
Validating and Sanitizing headers : This techniques is useful against cross site scripting or XSS, this technique includes validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values to reduce XSS attacks
Provide an explanation for what is MIB?
MIB ( control records Base ) is a virtual database. It consists of all the formal description about the network gadgets that can be controlled using SNMP. The MIB database is hierarchical and in MIB every controlled objects is addressed via object identifiers (OID).
Provide an explanation for what’s CSRF (cross site Request Forgery)? How you could save you this?
CSRF or pass web site request forgery is an assault from a malicious internet site with the intention to send a request to a web utility that a person is already authenticated against from a one-of-a-kind internet site. To save you CSRF you may append unpredictable mission token to each request and accomplice them with user’s consultation. it’ll ensure the developer that the request obtained is from a legitimate supply.
What are the forms of password cracking techniques?
The styles of password cracking method includes
What is LDAP ( lightweight listing get right of entry to Protocol ) ?
It is a protocol that is used for getting access to the listing list in the present active directory or also from the alternative listing offerings.