Ethical Hacking MCQ
Ethical Hacking MCQ
com
Ethical Hacking MCQ Quiz & Test
A. AttackSyllable
B. AttackBrute Forcing
C. AttacksHybrid
D. All of the above
A. Avoiding detection
B. Testing security controls
C. Resolving security vulnerabilities
D. Determining return on investment for security measures
A. Maintaining access
B. Gaining access
C. Reconnaissance
D. Scanning
Q5. Which type of hacker represents the highest risk to your network?
A. Black-hat hackers
B. Grey-hat hackers
C. Script kiddies
D. Disgruntled employees
A. Hacktivism
B. Black-hat hacking
C. . Active hacking
D. Activism
Q7. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
A. Local access
B. Remote attack
C. Internal attack
D. Physical access
A. 53
B. 443
C. 80
D. 21
Q10. Banner grabbing is an example of what?
A. Footprinting
B. Active operating system fingerprinting
C. Passive operating system fingerprinting
D. Application analysis
A. Full Open
B. XMAS
C. TCP connect
D. Syn scan
Q14. Which tool can be used to perform a DNS zone transfer on Windows?
A. DNSlookup
B. nslookup
C. whois
D. ipconfig
A. Active
B. Passive
C. DoS
D. Both 1 & 2
Q18. What is the major difference between an 'Ethical Hacker' and a 'Cracker'?
A. The ethical hacker has authorization from the owner of the target.
B. The ethical hacker is just a cracker who is getting paid.
C. The ethical hacker does not use the same techniques or skills as a cracker.
D. The ethical hacker does it strictly for financial motives unlike a cracker.
A. MAC spoofing
B. Session hijacking
C. Rogue access point
D. ARP poisoning
A. Thirty-two characters
B. Sixteen characters
C. Sixty-four characters
D. Eight characters
Q21. Which wireless mode connects machines directly to one another, without the use of
an access point?
A. Ad hoc
B. Point to point
C. Infrastructure
D. BSS
A. Cryptography
B. Encryption
C. Decryption
D. Penetration Testing