Interview Questions for Ethical Hacking – Chapter 4

Q.1. What’s the use of filtering ports on Firewall? A.1. Filtering ports on firewall application helps in blocking exact malware and applications which eventually protects the network from needless traffic. One common example will be like: many companies block the FTP (File Transfer Protocol) port, i.e. 21, when FTP hosting and communication is not required.   Q.2. What tool or technique you’ll suggest your company employees for encrypting the email Messages? A.2. One common suggestion for encrypting emails

Read more

Interview Questions for Ethical Hacking – Chapter 3

Q.1. Explain in brief how DoS attack works. A.1. In a usual connection, the customer forwards an acknowledgement requesting the server for authentication. The server acknowledge back with authentication endorsement to the requested user. User accepts this agreement and starts looking for server content. In DoS attack, the user is an attacker who is sending numerous authentication requests for acknowledging to server leading to huge traffic up. Every request it sends have fake return addresses and that’s why server is

Read more

Interview Questions for Ethical Hacking – Chapter 2

Q.1. How will you explain network sniffing in basic term? A.1. Network sniffing are the techniques used for monitoring and analysing data packets in real-time that are being sent and received in any computer network. They are also termed as packet sniffing or network probe.   Q.2. What are the three main types of hackers? A.2. The three major categories of hackers are: – i) White Hat hackers also termed as the ethical hackers or good security

Read more

Interview Questions for Ethical Hacking – Chapter 1

Q.1. How will you explain a newbie or beginner about what is cyber security? A.1. Cyber security can be defined as the calculated measures taken to protect the systems that are inter-connected to software and online applications, hardware and storage from cyber attacks.   Q. 2. What is vulnerability? A.2. Vulnerability in any system or application can be said to as the weakness or flaw that can let intruders or bugs penetrate the system, causing major threat.

Read more

Cryptosystem Attacks and Environment

Introduction: – In this modern era of technology, right from business to health system, all runs on technology and over that, each of the systems generate a huge amount of information. Hence it becomes a important part to focus on protecting these information rom mal-activities and getting into the wrong hands. Cryptosystems deal with two of such attack types to which your information is basically subject to. These are Active attack and Passive attack Active Attacks: Active attack deals

Read more