Interview Questions for Ethical Hacking – Chapter 3

Q.1. Explain in brief how DoS attack works.
A.1. In a usual connection, the customer forwards an acknowledgement requesting the server for authentication. The server acknowledge back with authentication endorsement to the requested user. User accepts this agreement and starts looking for server content. In DoS attack, the user is an attacker who is sending numerous authentication requests for acknowledging to server leading to huge traffic up. Every request it sends have fake return addresses and that’s why server is not able to find the user as it tries sending approval for authentication. The server waits for connecting back before closing. The moment it wants to close another fake request as mentioned above (earlier) is being done and it continues creating huge traffic to the server.


Q.2. How will you define Social Engineering?
A.2. Social engineering is the technique+ trick and art used to manipulate computer or other technology-based users to reveal their confidential data that is used for gaining unauthorised access to their systems and accounts. In other words, it’s a method of exploiting human kindness and subconscious-mind’s information.


Q.3. What skills you need to have if you are given a task to create Trojans from scratch?
A.3. The very basic skills that one need in order to create simple functional Trojan are:

  • How Trojans work
  • What different actions and attacks Trojans do
  • Some good programming languages like C#, java, C, C++, Python for coding the Trojan.
  • Networking and how remote connection architecture works


Q.4. What are the different types and categories of virus?
A.4. Different types and categories of virus are –

  • File Infecting and file sector Virus
  • Web scripting Virus
  • Boot Sector Virus
  • Browser Hijacking Virus
  • Polymorphic Virus
  • Macro Virus
  • Multipartite Virus


Q.5. Can you tell me 2 differences between Trojans and virus.
A.5. Trojans are harmful malicious programs that looks legitimate and works in background with specific goals to achieve but viruses deletes the original files and create a copies and can be seen doing malicious tasks like replicating and changing names and extensions of other files. Trojans don’t replicate. Viruses generally do not create backdoors like Trojans.


Q.6. Do you know about BurpSuite?

A.6. Burp Suite is a hybrid hacking tool implemented for diverse purposes, right from attacking web applications to stand-alone software also. This tool is incorporated with a combination of diverse likely tools hackers’ uses to attack an application. Lists of some major functionality provided by Burp Suite are –

  • Proxy
  • Comparer
  • Intruder
  • Decoder
  • Spider
  • Scanner
  • Repeater
  • Sequencer


Q.7. Explain in simple words, the “DoS” attack.
A.7. DoS attacks engage in flooding the victim’s servers or systems or even the entire networks with useless traffic for causing over utilization of victim resources. This leads to server down, or network response rate.


Leave a Reply

Your email address will not be published. Required fields are marked *