Ethical Hacking Interview Questions and Answers
Ques 11. What is the difference between virus and worm?
Virus: It is a type of malware that spreads by embedding a copy of itself and becomes a part of other programs. Viruses spread from one computer to another while sharing the software or document they are attached to using a network, file sharing, disk, or infected email attachments.
Worm: These are similar to viruses and cause the same type of damage. They replicate functional copies of themselves and do not require a host program or human help to propagate. Advanced worms leverage encryption, ransomware, and wipers to harm their targets.
Ques 12. What do you mean by keystroke logging?
Keystroke logging is also known as keylogging or keyboard capturing. It is a type of surveillance software that records every keystroke made on the keyboard. Every action made on the keyboard is monitored, and data is retrieved by operating through the logging program.
Ques 13. What do you mean by Trojan and explain its types?
A Trojan is a type of malware that is often developed by hackers or attackers to gain access to target systems. Users are manipulated by some attractive social media ads and then directed towards malicious sites into loading and performing Trojans on their systems.
Types of Trojans:
- Trojan-Downloader: It is a type of virus that downloads and installs other malware.
- Ransomware: It is a type of Trojan that can encrypt the data on your computer/device.
- Trojan-Droppers: These are complex programs used by cybercriminals to install malware. Most antivirus programs do not identify droppers as malicious, and hence it is used to install viruses.
- Trojan-Rootkits: It prevents the detection of malware and malicious activities on the computer.
- Trojan-Banker: These steal user account-related information such as card payments and online banking.
- Trojan-Backdoor: It is the most popular type of Trojan, that creates a backdoor for attackers to access the computer later on from remote using a remote access tool (RAT). This Trojan provides complete control over the computer.
Ques 14. What is Cowpatty?
Cowpatty is the implementation of the offline dictionary attack against WPA/WPA2 networks using PSK-based authentication.
E.g. WPA-Personal
Most of the enterprises employ PSK-based authentication for WPA/WPA2 networks.
Ques 15. What do you mean by exploitation?
Exploitation is a part of programmed software or script that allows hackers to gain control over the targeted system/network and exploit its vulnerabilities. Most hackers use scanners like OpenVAS, Nessus, etc., to find these vulnerabilities.
Most helpful rated by users: