Blog about Programming Languages & Coding

Blog about Programming Languages & Coding
Contents for Computer Science, IT, B.Sc. CS & IT, M.Sc. CS & IT, MCA, BE CS & IT, ME CS & IT , Interview Questions, Books and Online Course Recommendations from Udemy, Coursera, etc

Ethical Hacking MCQs with Answer

ETHICAL HACKING   

SR NO

Question

Option 1

Option 2

Option 3

Option 4

Correct Answer

UNIT 1

1

Inforamation security is also called_____

InfoSec

InfoWar

Firewall

SecureSystem

InfoSec

2

What is C stands for in CIA triad ?

Common

Confidentiality

calibre

candidate

Confidentiality

3

What is A stands for in CIA triad ?

Attack

Asset

Availabilty

Augmentation

Availabilty

4

What is I stands for in CIA triad ?

Intension

Integrity

Important

Illegal

Integrity

5

Authentication means _____ a claim of identity

completing

verifying

managing

checking

verifying

6

What is PIN Stands for ?

personal identification number

personal identification name

personal internal number

protection identification number

personal identification number

7

______ to access information and other computing serices begins with administrative policies and procedures

Authentication

Verification

Authorization

Validation

Authorization

8

____are used to support expert advice and cost-effective informaion management solution

RMIS

CIA

ACID

VVI

RMIS

9

Waht is a potential cause of an incident that may result in harm of systems and organization ?

Danger

Threat

Alert

Risk

Threat

10

_____replicates and executes itself, ususally doing damage to your computer in th process

Worm

Trojan Horse

Rabbit

Virus

Virus

11

____ is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information

Spyware Threat

Backtracking

Cookies

PIN

Spyware Threat

12

_____ is a weakness which can be exploited by a Threat

Weakness

Vulnerability

Virus

Threat

Vulnerability

13

An_____ is any attempt or tries to expose,alter,disable,destroy,steal or gain unauthorize access to or make unauthorized use of an asset

Attack

Asset

Alter

Attempt

Attack

14

______ attack attempts to alter system resources or affect their operation

Normal

Passive

Big

Active

Active

15

______ attack attempts to learn or make use of infomationfrom the system but does not affect system resources

Normal

Passive

Big

Active

Passive

16

_____ ia any softrware intentionally designed to cause affect or damage to a computer,server or network

Virus

Malware

Worm

Bug

Malware

17

_____ path by attacker get an access to an information system to perform malicious activities

Threat

Attack

Plan

Attack Vectors

Attack Vectors

18

____ moves to machine to machine

Virus

Worm

Trojan

Threat

Virus

19

_____ tends to leach onto network traffic

Virus

Worm

Trojan

Threat

Worm

20

_____ disigned to take complete program of a system

Virus

Worm

Trojan

Rootkits

Rootkits

21

The Open Web Application Security Project (OWASP) is a _____ organisation

commercial

non-profit

free

banking

non-profit

22

Cross-site scripting (XSS) flaws give attacker the cpability to inject _____ scripts into the application

server-side

client-side

victim-side

attacker-side

client-side

23

SQL Injection is also known as ____

SQL Inj

SQL

Injection

SQLI

SQLI

24

_____ can detect misconfigurations such as leaky APIs

DHCP

FAST

DAST

Firewall

DAST

25

_____ is the acion of recording the keys struck on a keyboard

keystroke logging

key count

backtracking

phishing

keystroke logging

26

_____is acyber-attack in which the prepetrator seeks to machine or network resource unavailable

Denial of Service

Denial of Request

Denial of Response

Denial of Server

Denial of Service

27

_____ attack is a malware attack in which the attacker observes the websites often visited by a victim

malware

waterhole

DOS

Rootkits

waterhole

28

A brute force attack is a _____ method

rapid

fast

trial-and-error

slow

trial-and-error

29

________ is a cyber attack that uses disguised email as a weapon

Backtrack

Phishing

DOS

brute force

Phishing

30

The motive behind _____ is not to harm the system but to get some information without being identified

Eavesdropping

Phishing

DOS

brute force

Eavesdropping

31

______ is cyber attack where a malicious actor inserts him/herself into a conversation between two parties

Eavesdropping

Phishing

DOS

Man-in-the-middle

Man-in-the-middle

32

THe_____ attack consists of the exploitation of the web session control mechanism

DOS

Session Hijacking

backtracking

shoulder surfing

Session Hijacking

33

In which attack the hacker hides the actual UI where victim is supposed to click ?

Hijacking

Clickjacking

Session Hijacking

Man-in-the-middle

Clickjacking

34

____ is done to make users access a spoof website rather than the intended destination

Eavesdropping

Phishing

Man-in-the-middle

URL Obfuscation

URL Obfuscation

35

DNS Spoofing also known as _____

DNS Cache poisoning

DNS Clearance

Spoofing

Sniffing

DNS Cache poisoning

36

In which attack attacker changes MAC address and attacks on Ethernet LAN

DNS Cache poisoning

APR poisoning

Spoofing

Sniffing

APR poisoning

37

____ are programs to execute a series of operation automatically

bots

robots

machine

helper

bots

38

____ means completeness and accuracy of data

consistency

integrity

fullness

correct

integrity

39

Full form of WAP in WiFi

Wireless Access Protocol

Wireless Access Point

Wide Area Protocol

Wireless Area Protocol

Wireless Access Point

40

_____ is the method by which organisation evaluate potential losses and take action to reduce or eliminate threats

Risk

Risk Management

Risk Control

Risk Handling

Risk Control

41

____ is the process of identifying negative and positive risks that impact an objective

Risk Management

Risk Control

Risk Removal

Risk assesment

Risk assesment

42

_____ is the determination of how an organization will pay for loss events in the most effective way possible

Risk Management

Risk Control

Risk Financing

Risk assesment

Risk Financing

43

Which attack arrive with email attachment ?

Virus

Trojan

Worm

Malware

Trojan

44

Thing whis is easier to attack is ______

Bad

Danger

Vulnerable

risky

Vulnerable

45

The Rabbit virus makes multiple copies of itself on a single computer

Trojan

worm

Rabbit

Malware

Rabbit

46

A____ is the secure and confidential information to an untrusrted environment

data release

data breach

false data

attack

data breach

47

_____ can be used to perform Distributed Denial-of-Service (DDoS)

Botnets

zombie

malware

infected

Botnets

48

A ______ is a computer connected to the Internet that has been compromised by a hacker,

Botnets

zombie

malware

infected

zombie

49

eBay has been described as ______

Victim

Bull

golden goose

gold fish

golden goose

50

The WannaCry ransomware attack had exploited vulnerability in Windows OS called ____

Eternal

Blue

BabyCry

EternalBlue

EternalBlue

UNIT 2

1

____is the process of expliting wealness int the system and gaining unauthorized access to data

Attack

Hijacking

Hacking

threat

Hacking

2

____ hackers always takes permission of the scurity expert to find security vulnerabilities that a malicious hacker could potentially exploit

hacker

white hat hacker

green hat hacker

red hat hacker

white hat hacker

3

White hat hackers are also called as ethical hacker or ______

security

kerboros

watchdog

pen testers

pen testers

4

_____ hackeers are bad guys that operate on the oppposite side of law

black hat

white hat

green hat

red hat

black hat

5

_____ hackerws straddle the line between good and bad and have decided to reform and become the good side

green hat

white hat

grey hat

black hat

grey hat

6

NDA stands for ______

National Defence Academy

Non-disclosure agreement

Non-developed asset

national digital agency

Non-disclosure agreement

7

If the information is leaked, the injured person can claim ____ of contract

end

suspension

violation

breach

breach

8

_____ is approach which is used to test a software without knowing the interenal structure of program or application

Black box

White box

Blue box

Grey box

Black box

9

____ is approach where the internal structure and working completely known to the user

Blue box

Glass box

Black box

White box

White box

10

_____ testing is based on trail and error method

White box

Blue box

Glass box

Black box

White box

11

In ______ testing data domains and internal boundaries can be tested

Blue box

Glass box

Black box

White box

Black box

12

In ______testing generally lnowledge is not required

Blue box

White box

Glass box

White box

White box

13

In_______testing extensive implementation knowledge is required

Black box

White box

Blue box

Grey box

Black box

14

A_____ is the process of defining, identifying, clasifying and prioritizing vulnerabilities

Checking

Vulnerability assessment

Testing

identifying

Vulnerability assessment

15

____ testing is the process to identify security vulnerabilitise in the application

Checking

Vulnerability assessment

Pentration

identifying

Pentration

UNIT 3

1

____hacking involves gaining access of the system as well as changing the integrity of the system

system

black hat

grey hat

white hat

system

2

A_____ can refer to any good computer programmer

security

developer

hacker

tester

hacker

3

Linux is ___ operating syystem

open source

expensive

difficult

automated

open source

4

Windows is ___ operating syystem

open source

automated

difficult

not open source

not open source

5

____ kernel is used in Windows

Monolithic kernel

Micro kernel

simple kernel

complex kernel

Micro kernel

6

____ kernel is used in Linux

Monolithic kernel

Micro kernel

simple kernel

complex kernel

Monolithic kernel

7

In Windows seperation of the directories using ______

Back slash

Forward slash

dot

uderscore

Forward slash

8

In Linux seperation of the directories using ______

Back slash

Forward slash

dot

uderscore

Back slash

9

In _____ file naming is case sensitive

Solaries

Mac

Linux

Windows

Linux

10

In _____ file naming is case insensitive

Linux

Windows

Solaries

Mac

Windows

11

_____ framework is a collection of shellcodes, exploits, fuzzing tools, encoders, payloads

Simple

Complex

.Net

Metasploit

Metasploit

12

____ Linux is based on a rolling release model

Red hat

Kali

Ubuntu

Dolphin

Kali

13

The process of gathering information about your target is known as_______

enumeration

Hacking

data gathering

hijacking

enumeration

14

What is common port number of HTTP ?

40

81

80

21

80

15

What is common port number of FTP ?

40

80

81

21

21

Ethical Hacking MCQs with Answer Ethical Hacking MCQs with Answer Reviewed by Asst. Prof. Sunita Rai, Computer Sci.. Dept., G.N. Khalsa College, Mumbai on January 11, 2022 Rating: 5

No comments:

Powered by Blogger.