Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Ethical Hacking Interview Questions and Answers
Home
Questions
Ethical Hacking
+1
vote
Q: What is a DDoS attack and how does it work?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
ddos-attacks
attacks
hacking
+1
vote
Q: What is Cross-Site scripting and how can you fix it?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
cross-site-scripting
cross-site
scripting
+1
vote
Q: What is SQL injection and how to prevent it?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
sql-injection
sql
ethical-hacking
+1
vote
Q: What is DNS Cache Poisoning?
asked
May 16, 2021
in
Ethical Hacking
by
rajeshsharma
dns-cache
cache-poisoning
+1
vote
Q: What is ARP poisoning?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
arp
arp-poisoning
hacking
+1
vote
Q: What are the best sniffing tools?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
sniffing
sniffing-tools
hacking
+1
vote
Q: What is sniffing and what are its types?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
#sniffing
hacking
+1
vote
Q: What do you mean by fingerprinting in ethical hacking?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
#hacking
fingerprint
+1
vote
Q: What is footprinting?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
footprinting
hacking
+1
vote
Q: What is MAC flooding and how to prevent it?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
mac-flooding
mac
hacking
+1
vote
Q: What is MIB?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
mib
ethical-hacking
+1
vote
Q: What is defacement?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
defacement
ethical-hacking
+1
vote
Q: What are the different enumerations available in ethical hacking?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
enumerations
ethical-hacking
0
votes
Q: What is enumeration in ethical hacking?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
enumeration
ethical-hacking
+1
vote
Q: What do you mean by exploitation?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
exploitation
hacking
+1
vote
Q: What do you mean by Trojan and explain its types?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
trojan
hacking
+1
vote
Q: What do you mean by keystroke logging?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
keystroke-log
logging
hacking
+1
vote
Q: What is the difference between virus and worm?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
virus
worm
ethical-hacking
+1
vote
Q: What is the difference between IP address and Mac address?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
mac-address
ip-address
hacking
+1
vote
Q: What is the difference between encryption and hashing?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
encryption
hacking
+1
vote
Q: What is a firewall?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
#firewall
hacking
+1
vote
Q: What are the various stages of hacking?
asked
May 15, 2021
in
Ethical Hacking
by
rajeshsharma
#hacking
hacking-stages
+1
vote
Q: What are the advantages and disadvantages of ethical hacking?
asked
May 14, 2021
in
Ethical Hacking
by
rajeshsharma
ethical-hacking
advantages-hacking
+1
vote
Q: What are the different types of hacking?
asked
May 14, 2021
in
Ethical Hacking
by
rajeshsharma
hacking-types
hacking
ethical-hacking
+1
vote
Q: What are the types of hackers?
asked
May 14, 2021
in
Ethical Hacking
by
rajeshsharma
types-hacking
hackers-types
hacking
+1
vote
Q: What is ethical hacking?
asked
May 14, 2021
in
Ethical Hacking
by
rajeshsharma
ethical-hacking
hacking
+1
vote
Q: What is hacking?
asked
May 14, 2021
in
Ethical Hacking
by
rajeshsharma
hacking
ethical-hack
0
votes
Q: An error message displayed on the system symbolizes virus infection.
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#ethicalhacking
#virus
0
votes
Q: Hash functions can be leveraged to ensure ________.
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#ethicalhacking
0
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for_____________.
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#mac
Page:
« prev
1
2
3
4
5
next »
...