Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Ethical Hacking Interview Questions and Answers
Home
Questions
Ethical Hacking
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Q: Threats can exploit assets if assets are not vulnerable in cybersecurity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#threats
#cybersecurity
+1
vote
Q: What is the common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: The telephone version of phishing that exploits social engineering techniques is known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A framework that utilizes a Network Policy Server is called __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
network-policy
framework
network-framework
+1
vote
Q: Phishing emails include fake notifications from banks and e-payment systems.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A proactive process to predict potential risks efficiently.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following are the three phases of Incident response maturity assessment?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following is an attack against confidentiality?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Hash functions can be leveraged to ensure ________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Which of the following attributes is not a PII?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: The security posture of an organization is defined by the ______ link in the chain. Strongest Average Weakest
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
Q: What is PUP?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+3
votes
Q: Which of the following can be considered as an effective solution to ensure integrity?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
#abstraction
+1
vote
Q: Which encryption method is more suitable for quickly encrypting large amounts of data?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: _________ is commonly known for providing backdoor access to the system for malicious users.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+2
votes
Q: Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
#fast-changing
##machine-learning
0
votes
Q: What is SSL ?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
ssl
0
votes
Q: Differentiate Between a MAC and an IP Address?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
mac-address
ip-address
0
votes
Q: What are the different types of spoofing?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
types-of-spoofing
spoofing-types
0
votes
Q: What is meant by spoofing attack?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
spoofing-attack
0
votes
Q: Which programming language is used for hacking?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
programming-language
hacking-language
+1
vote
Q: What's a denial of service (DOS) attack
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
denial-of-service
0
votes
Q: What is SQL injection and its types?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
sql-injection
Page:
« prev
1
2
3
4
5
next »
...