ETHICAL HACKING |
||||||
SR NO |
Question |
Option 1 |
Option 2 |
Option 3 |
Option 4 |
Correct Answer |
UNIT 1 |
||||||
1 |
Inforamation security is also called_____ |
InfoSec |
InfoWar |
Firewall |
SecureSystem |
InfoSec |
2 |
What is C stands for in CIA triad ? |
Common |
Confidentiality |
calibre |
candidate |
Confidentiality |
3 |
What is A stands for in CIA triad ? |
Attack |
Asset |
Availabilty |
Augmentation |
Availabilty |
4 |
What is I stands for in CIA triad ? |
Intension |
Integrity |
Important |
Illegal |
Integrity |
5 |
Authentication means _____ a claim of identity |
completing |
verifying |
managing |
checking |
verifying |
6 |
What is PIN Stands for ? |
personal
identification number |
personal identification name |
personal internal number |
protection identification number |
personal identification number |
7 |
______ to access information and other computing serices begins
with administrative policies and procedures |
Authentication |
Verification |
Authorization |
Validation |
Authorization |
8 |
____are used to support expert advice and cost-effective
informaion management solution |
RMIS |
CIA |
ACID |
VVI |
RMIS |
9 |
Waht is a potential cause of an incident that may result in harm
of systems and organization ? |
Danger |
Threat |
Alert |
Risk |
Threat |
10 |
_____replicates and executes itself, ususally doing damage to
your computer in th process |
Worm |
Trojan Horse |
Rabbit |
Virus |
Virus |
11 |
____ is any program that monitors your online activities or
installs programs without your consent for profit or to capture personal
information |
Spyware
Threat |
Backtracking |
Cookies |
PIN |
Spyware Threat |
12 |
_____ is a weakness which can be exploited by a Threat |
Weakness |
Vulnerability |
Virus |
Threat |
Vulnerability |
13 |
An_____ is any attempt or tries to
expose,alter,disable,destroy,steal or gain unauthorize access to or make
unauthorized use of an asset |
Attack |
Asset |
Alter |
Attempt |
Attack |
14 |
______ attack attempts to alter system resources or affect their
operation |
Normal |
Passive |
Big |
Active |
Active |
15 |
______ attack attempts to learn or make use of infomationfrom
the system but does not affect system resources |
Normal |
Passive |
Big |
Active |
Passive |
16 |
_____ ia any softrware intentionally designed to cause affect or
damage to a computer,server or network |
Virus |
Malware |
Worm |
Bug |
Malware |
17 |
_____ path by attacker get an access to an information system to
perform malicious activities |
Threat |
Attack |
Plan |
Attack
Vectors |
Attack Vectors |
18 |
____ moves to machine to machine |
Virus |
Worm |
Trojan |
Threat |
Virus |
19 |
_____ tends to leach onto network traffic |
Virus |
Worm |
Trojan |
Threat |
Worm |
20 |
_____ disigned to take complete program of a system |
Virus |
Worm |
Trojan |
Rootkits |
Rootkits |
21 |
The Open Web Application Security Project (OWASP) is a _____
organisation |
commercial |
non-profit |
free |
banking |
non-profit |
22 |
Cross-site scripting (XSS) flaws give attacker the cpability to
inject _____ scripts into the application |
server-side |
client-side |
victim-side |
attacker-side |
client-side |
23 |
SQL Injection is also known as ____ |
SQL Inj |
SQL |
Injection |
SQLI |
SQLI |
24 |
_____ can detect misconfigurations such as leaky APIs |
DHCP |
FAST |
DAST |
Firewall |
DAST |
25 |
_____ is the acion of recording the keys struck on a keyboard |
keystroke logging |
key count |
backtracking |
phishing |
keystroke logging |
26 |
_____is acyber-attack in which the prepetrator seeks to machine
or network resource unavailable |
Denial of Service |
Denial of Request |
Denial of Response |
Denial of Server |
Denial of Service |
27 |
_____ attack is a malware attack in which the attacker observes
the websites often visited by a victim |
malware |
waterhole |
DOS |
Rootkits |
waterhole |
28 |
A brute force attack is a _____ method |
rapid |
fast |
trial-and-error |
slow |
trial-and-error |
29 |
________ is a cyber attack that uses disguised email as a weapon |
Backtrack |
Phishing |
DOS |
brute force |
Phishing |
30 |
The motive behind _____ is not to harm the system but to get
some information without being identified |
Eavesdropping |
Phishing |
DOS |
brute force |
Eavesdropping |
31 |
______ is cyber attack where a malicious actor inserts
him/herself into a conversation between two parties |
Eavesdropping |
Phishing |
DOS |
Man-in-the-middle |
Man-in-the-middle |
32 |
THe_____ attack consists of the exploitation of the web session
control mechanism |
DOS |
Session Hijacking |
backtracking |
shoulder surfing |
Session Hijacking |
33 |
In which attack the hacker hides the actual UI where victim is
supposed to click ? |
Hijacking |
Clickjacking |
Session Hijacking |
Man-in-the-middle |
Clickjacking |
34 |
____ is done to make users access a spoof website rather than
the intended destination |
Eavesdropping |
Phishing |
Man-in-the-middle |
URL Obfuscation |
URL Obfuscation |
35 |
DNS Spoofing also known as _____ |
DNS Cache poisoning |
DNS Clearance |
Spoofing |
Sniffing |
DNS Cache poisoning |
36 |
In which attack attacker changes MAC address and attacks on
Ethernet LAN |
DNS Cache poisoning |
APR poisoning |
Spoofing |
Sniffing |
APR poisoning |
37 |
____ are programs to execute a series of operation automatically |
bots |
robots |
machine |
helper |
bots |
38 |
____ means completeness and accuracy of data |
consistency |
integrity |
fullness |
correct |
integrity |
39 |
Full form of WAP in WiFi |
Wireless Access Protocol |
Wireless Access Point |
Wide Area Protocol |
Wireless Area Protocol |
Wireless Access Point |
40 |
_____ is the method by which organisation evaluate potential
losses and take action to reduce or eliminate threats |
Risk |
Risk Management |
Risk Control |
Risk Handling |
Risk Control |
41 |
____ is the process of identifying negative and positive risks
that impact an objective |
Risk Management |
Risk Control |
Risk Removal |
Risk assesment |
Risk assesment |
42 |
_____ is the determination of how an organization will pay for
loss events in the most effective way possible |
Risk Management |
Risk Control |
Risk Financing |
Risk assesment |
Risk Financing |
43 |
Which attack arrive with email attachment ? |
Virus |
Trojan |
Worm |
Malware |
Trojan |
44 |
Thing whis is easier to attack is ______ |
Bad |
Danger |
Vulnerable |
risky |
Vulnerable |
45 |
The Rabbit virus makes multiple copies of itself on a single
computer |
Trojan |
worm |
Rabbit |
Malware |
Rabbit |
46 |
A____ is the secure and confidential information to an
untrusrted environment |
data release |
data breach |
false data |
attack |
data breach |
47 |
_____ can be used to perform Distributed Denial-of-Service
(DDoS) |
Botnets |
zombie |
malware |
infected |
Botnets |
48 |
A ______ is a computer connected to the Internet that has been
compromised by a hacker, |
Botnets |
zombie |
malware |
infected |
zombie |
49 |
eBay has been described as ______ |
Victim |
Bull |
golden goose |
gold fish |
golden goose |
50 |
The WannaCry ransomware attack had exploited vulnerability in
Windows OS called ____ |
Eternal |
Blue |
BabyCry |
EternalBlue |
EternalBlue |
UNIT 2 |
||||||
1 |
____is
the process of expliting wealness int the system and gaining unauthorized
access to data |
Attack |
Hijacking |
Hacking |
threat |
Hacking |
2 |
____
hackers always takes permission of the scurity expert to find security
vulnerabilities that a malicious hacker could potentially exploit |
hacker |
white hat
hacker |
green hat hacker |
red hat hacker |
white hat
hacker |
3 |
White
hat hackers are also called as ethical hacker or ______ |
security |
kerboros |
watchdog |
pen
testers |
pen
testers |
4 |
_____
hackeers are bad guys that operate on the oppposite side of law |
black hat |
white hat |
green hat |
red hat |
black hat |
5 |
_____
hackerws straddle the line between good and bad and have decided to reform
and become the good side |
green hat |
white hat |
grey hat |
black hat |
grey hat |
6 |
NDA
stands for ______ |
National Defence Academy |
Non-disclosure
agreement |
Non-developed asset |
national digital agency |
Non-disclosure
agreement |
7 |
If
the information is leaked, the injured person can claim ____ of contract |
end |
suspension |
violation |
breach |
breach |
8 |
_____
is approach which is used to test a software without knowing the interenal
structure of program or application |
Black box |
White box |
Blue box |
Grey box |
Black box |
9 |
____
is approach where the internal structure and working completely known to the
user |
Blue box |
Glass box |
Black box |
White box |
White box |
10 |
_____
testing is based on trail and error method |
White box |
Blue box |
Glass box |
Black box |
White box |
11 |
In
______ testing data domains and internal boundaries can be tested |
Blue box |
Glass box |
Black box |
White box |
Black box |
12 |
In
______testing generally lnowledge is not required |
Blue box |
White box |
Glass box |
White box |
White box |
13 |
In_______testing
extensive implementation knowledge is required |
Black box |
White box |
Blue box |
Grey box |
Black box |
14 |
A_____
is the process of defining, identifying, clasifying and prioritizing
vulnerabilities |
Checking |
Vulnerability assessment |
Testing |
identifying |
Vulnerability
assessment |
15 |
____
testing is the process to identify security vulnerabilitise in the
application |
Checking |
Vulnerability assessment |
Pentration |
identifying |
Pentration |
UNIT 3 |
||||||
1 |
____hacking
involves gaining access of the system as well as changing the integrity of
the system |
system |
black hat |
grey hat |
white hat |
system |
2 |
A_____
can refer to any good computer programmer |
security |
developer |
hacker |
tester |
hacker |
3 |
Linux
is ___ operating syystem |
open
source |
expensive |
difficult |
automated |
open
source |
4 |
Windows
is ___ operating syystem |
open source |
automated |
difficult |
not open
source |
not open
source |
5 |
____
kernel is used in Windows |
Monolithic kernel |
Micro
kernel |
simple kernel |
complex kernel |
Micro
kernel |
6 |
____
kernel is used in Linux |
Monolithic
kernel |
Micro kernel |
simple kernel |
complex kernel |
Monolithic
kernel |
7 |
In
Windows seperation of the directories using ______ |
Back slash |
Forward
slash |
dot |
uderscore |
Forward
slash |
8 |
In
Linux seperation of the directories using ______ |
Back slash |
Forward slash |
dot |
uderscore |
Back slash |
9 |
In
_____ file naming is case sensitive |
Solaries |
Mac |
Linux |
Windows |
Linux |
10 |
In
_____ file naming is case insensitive |
Linux |
Windows |
Solaries |
Mac |
Windows |
11 |
_____
framework is a collection of shellcodes, exploits, fuzzing tools, encoders,
payloads |
Simple |
Complex |
.Net |
Metasploit |
Metasploit |
12 |
____
Linux is based on a rolling release model |
Red hat |
Kali |
Ubuntu |
Dolphin |
Kali |
13 |
The
process of gathering information about your target is known as_______ |
enumeration |
Hacking |
data gathering |
hijacking |
enumeration |
14 |
What
is common port number of HTTP ? |
40 |
81 |
80 |
21 |
80 |
15 |
What
is common port number of FTP ? |
40 |
80 |
81 |
21 |
21 |
Ethical Hacking MCQs with Answer
Reviewed by Asst. Prof. Sunita Rai, Computer Sci.. Dept., G.N. Khalsa College, Mumbai
on
January 11, 2022
Rating:
Subscribe to:
Post Comments
(
Atom
)
No comments: