ETI4(4)
ETI4(4)
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system
aretermed as
Answer: b
2. Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
a) Cracking
c) Ethical hacking
d) Hactivism
Answer: c
3. They are nefarious hackers, and their main motive is to gain financial profit by doing cybercrimes.
c) Hactivists
Answer: d
Answer: a
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and in-
depthworking of security and hacking tools are called
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
a) who break a system for some specific purpose with or without keeping in mind that they may suffer
long termimprisonment due to their malicious activity
c) who know the consequences of their hacking activities and hence try to prevent them by erasing their
digitalfootprints
Answer: a
7. Criminal minded individuals who work for terrorist organizations and steal information of nations
andother secret intelligence are
c) Cyber Terrorists
Answer: c
8. One who disclose information to public of a company, organization, firm, government and
privateagency and he/she is the member or employee of that organization; such individuals are termed
as
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they”referred to?
b) Elite Hackers
Answer: b
10.are those individuals who maintain and handles IT security in any firm or organization.
a) IT Security Engineer
d) Security Auditor
Answer: a
b) probe for safety and security of organization‟s security components and systems
Answer: b
12. are senior level corporate employees who have the role and responsibilities of creating anddesigning
secured network or security structures.
a) Ethical Hackers
c) IT Security Engineers
d) Security Architect
Answer: d
13. security consultants uses database security monitoring & scanning tools to maintainsecurity to
different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
Answer: a
14. Governments hired some highly skilled hackers. These types of hackers are termed as
a) Special Hackers
b) Government Hackers
Answer: d
15. Someone (from outside) who tests security issues for bugs before launching a system orapplication,
and who is not a part of that organization or company are
Answer: c
a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security
Answer: c
Answer: a
18.is a code injecting method used for attacking the database of a system / website.
a) HTML injection
b) SQL Injection
d) XML Injection
Answer: b
c) X Site Scripting
Answer: d
20. This attack can be deployed by infusing a malicious code in a website’s comment section. What is
a) SQL injection
b) HTML Injection
Answer: c
21. When there is an excessive amount of data flow, which the system cannot handle, attacktakes place.
Answer: d
22. Compromising a user’s session for exploiting the user’s data and do malicious activities or
misuseuser’s credentials is called
a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
Answer: a
Answer: b
a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
Answer: d
25. An attempt to harm, damage or cause threat to a system or network is broadly termed as
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
Answer: b
a) Keyhijacking
b) Keyjacking
c) Keylogging
d) Keyboard monitoring
Answer: c
27.are the special type of programs used for recording and tracking user’s keystroke.
a) Keylogger
b) Trojans
c) Virus
d) Worms
Answer: a
28. Stuxnet is a
a) Worm
b) Virus
c) Trojan
d) Antivirus
Answer: a
29. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
Answer: c
30. is the latest technology that faces an extra challenge because of CIA paradigm.
a) Big data
b) Database systems
c) Cloud storages
d) Smart dust
Answer: a
a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering
Answer: b
32. is the practice and precautions taken to protect valuable information from unauthorisedaccess,
recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
Answer: c
33. From the options below, which of them is not a vulnerability to information security?
a) flood
Answer: a
34. platforms are used for safety and protection of information in the cloud.
c) AWS
d) One Drive
Answer: a
35. technology is used for analyzing and monitoring traffic in network and information flow.
Answer: d
a) Bug
b) Threat
c) Vulnerability
d) Attack
Answer: b
a) Bug
b) Threat
c) Vulnerability
d) Attack
Answer: c
a) reduced
b) transferred
c) protected
d) ignored
Answer: d
39. How many basic processes or steps are there in ethical hacking?
a) 4
b) 5
c) 6
d) 7
Answer: c
40.is the information gathering phase in ethical hacking from the target user.a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
Answer: a
41. Which of the following is not a reconnaissance tool or technique for information gathering?
a) Hping
b) NMAP
c) Google Dorks
d) Nexpose
Answer: d
a) 2
b) 3
c) 4
d) 5
Answer: a
d)Searchingthetarget‟sdetails inpaperfiles
Answer: b
Answer: d
a) Vulnerability scanning
b) Sweeping
c) Port Scanning
d) Google Dorks
Answer: d
a) NMAP
b) Nexpose
c) Maltego
d) Nessus
Answer: c
47. Which of the following comes after scanning phase in ethical hacking?
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
Answer: d
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
Answer: d
49. A can gain access illegally to a system if the system is not properly tested in scanningand gaining
access phase.
a) security officer
b) malicious hacker
c) security auditor
d) network analyst
Answer: b
50. Which of the following hacking tools and techniques hackers’ do not use for maintaining access ina
system?
a) Rootkits
b) Backdoors
c) Trojans
d) Wireshark
Answer: d
51. In phase, the hackers try to hide their footprints.
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Gaining access
Answer: b
b) Tunnelling
c) Port Scanning
d) Footprint removing
Answer: c
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Reporting
Answer: d
c) Encrypting
d) None of these
a) Scanner
b) Decoder
c) Proxy
d) All of these
b) Weakness
c) a & b
d) None of these
a) Remove
b) measure
c) Reject
d) None of these
A) Maintaining Access
B) Reconnaissance
C) Scanning
D) Gaining Access
a) B, C, D, A
b) B, A C, D
c) A, B, C, D
d) D, C, B, A
a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
Answer: b
C.Encryption.
D.None of these.
Ans. B
A.Scanner
B.Decoder
C.Proxy
D.All of these.
Ans. D
A.Strengths.
B.Weakness.
C.A &B
D.None of these.
Ans. B
A.Remove.
B.Measure.
C.Reject.
D.None of these.
Ans. B
A.Maintaining Access.
B.Reconnaissance
C.Scanning.
D.Gaining Access.
A.B, C, D, A
B.B, A, C, D
C.A, B, C, D
D.D, C, B, A
Ans. A
65. is the art of exploiting the human elements to gain access to the authorized user.
A.Social Engineering.
B.IT Engineering.
C.Ethical Hacking.
Ans. A
Ans. B
Ans. A
A.G. Palma.
B.Raymond.
C.Either.
D.Jhon Browman.
Ans. B
A.Decade.
B.Year.
C.Century
D.Era.
Ans. C
A.Fame.
B.Profit.
C.Revenge.
Ans. D
Ans. C
72.Keeping information secured can protect an organization image and save and organization lot
of money
A.True
B.False
Ans. A
B.False
Ans. A
A.Police
B.Forensics
C.Thief
D.Hacker
Ans. C
A.Firewall
B.Encryption
C.VNPs
Ans. D
76.exploits that involves manipulating people and user even your self are the greatest
A.Nontechnical attacks
Ans. A
77.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of -
A.Nontechnical attacks
Ans. B
78. comprise of large portion of hacker attacks simply because every computer has one
A.Nontechnical attacks
Ans. C
A.Data gathering.
B.Attacking
C.Planning
D.Research
Ans. C
A.Written permission.
C.Privacy permission
D.Risk permission.
Ans. A
A.Nmap
B.LC4
C.ToneLOC
D.Nessus
Ans. B
A.Whisker
B.Super scan
C.Nikto
DKismet
Ans. A
83.has now evolved to be one of the most popular automated tools for unethical
hacking.
A.Automated apps
B.Database software
C.Malware
D.Worms
Ans. C
84.Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A.True
B.False
Ans. A
85.A penetration tester must identify and keep in mind the &
C.hacking techniques
Ans. A
86.The legal risks of ethical hacking include lawsuits due to of personal data.
A.stealing
B.disclosure
C.deleting
D.hacking
Ans. B
87.Before performing any penetration test, through legal procedure, which key points listed
Ans. D
a__. A. Decade.
B. Year.
C. Century
D. Era.
Ans. C
A. Fame.
B. Profit.
C. Revenge.
Ans. D
90.The intent of ethical hacker is to discover vulnerabilities from a___ point of view to better secure
system.
A. Victims.
B. Attackers.
C. Both A & B
D. None of these.
Ans. B
A. Entries.
B. Checklists.
C. Both A & B
Ans. B
A. Penetration testing.
B. Intrusion testing.
C. Red teaming.
Ans. D
93.___ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
Ans. B
Ans. A
Ans. B
Ans. C
A. Nmap
B. LC4
C. ToneLOC
D. Nessus
Ans. B
A. Whisker
B. Super scan
C. Nikto
D. Kismet
Ans. A
A. WebInspect
B. QualyGuard
Ans. C
B. Kidnapper
C. Both A & B
Ans.