0% found this document useful (0 votes)
5 views

Ethical hacking questions

The document is a question bank related to cybersecurity, covering various topics such as password attacks, SQL injection prevention, denial of service attacks, social engineering techniques, and network reconnaissance methods. It includes multiple-choice questions that test knowledge on vulnerabilities, encryption algorithms, malware types, and security protocols. The questions are designed for individuals preparing for cybersecurity assessments or certifications.

Uploaded by

kaiserwilhelm39
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Ethical hacking questions

The document is a question bank related to cybersecurity, covering various topics such as password attacks, SQL injection prevention, denial of service attacks, social engineering techniques, and network reconnaissance methods. It includes multiple-choice questions that test knowledge on vulnerabilities, encryption algorithms, malware types, and security protocols. The questions are designed for individuals preparing for cybersecurity assessments or certifications.

Uploaded by

kaiserwilhelm39
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Cyber Sentinels

Question Bank

1. Which of the following is a type of password attack?


a) Brute force
b) Cross-site scripting
c) SQL injection
d) Denial of Service

2. Which of the following is a way to prevent SQL injection attacks?

a) Encrypting network traffic

b) Implementing a firewall

c) Input validation

d) Installing antivirus software

3. Which of the following is a type of denial of service attack?

a) Smurf attack

b) SQL injection

c) Cross-site scripting

d) Port scanning

4. Which of the following is NOT an example of a social engineering


technique?

a) Pretexting

b) Phishing

c) Shoulder surfing

d) SQL injection
5. Which of the following is an example of a passive network reconnaissance
technique?

a) Port scanning

b) Ping sweep

c) Banner grabbing

d) Sniffing

6. Which of the following is NOT an example of a cryptography algorithm?

a) AES

b) RSA

c) SHA

d) SQL

7. Which of the following is a technique used to prevent a buffer overflow


attack?

a) Input validation

b) Brute force attack

c) Man-in-the-middle attack

d) Social engineering attack

8. Which of the following is an example of a black box testing technique?

a) Fuzz testing

b) Penetration testing

c) Vulnerability scanning

d) Source code review


9. Which of the following is NOT a common method used for social
engineering attacks?

A) Pretexting

B) Phishing

C) Vishing

D) Port Scanning

10. Which of the following is a common vulnerability assessment tool used to


identify weaknesses in a network?

A) Metasploit

B) Nikto

C) Nessus

D) Wireshark

11. What type of attack is designed to exhaust a network's resources and deny
access to legitimate users?

A) Smurf attack

B) SQL injection

C) Cross-site scripting

D) Social engineering

12. Which of the following is NOT a common encryption algorithm used to


protect data?

A) AES

B) RSA

C) SHA-1

D) Blowfish
13. Which of the following is a method used to hide a message or file inside
another message or file?

A) Steganography

B) Cryptography

C) Hashing

D) Brute-force attack

14. Which of the following is NOT a type of social engineering attack?

a) Phishing

b) Shoulder surfing

c) Bluejacking

d) Spoofing

15. Which of the following is a common technique used by attackers to exploit


buffer overflow vulnerabilities?

a) Cross-site scripting

b) SQL injection

c) DNS spoofing

d) Shellcode injection

16. Which of the following is NOT a step in the vulnerability assessment


process?

a) Scanning

b) Enumeration

c) Fuzzing

d) Exploitation
17. Which of the following is a technique used by attackers to gain access to a
system by exploiting a weakness in the system's authentication mechanism?

a) Password spraying

b) Port scanning

c) Ping of Death

d) DNS rebinding

18. Which of the following is a technique used by attackers to hide their tracks
by erasing evidence of their activities from log files?

a) SQL injection

b) Privilege escalation

c) Fileless malware

d) Log tampering

19. Which of the following is a passive reconnaissance technique used in


ethical hacking?

a) Port Scanning

b) Social Engineering

c) Sniffing

d) SQL Injection

20. Which of the following is a technique used to hide data in plain sight?

a) Steganography

b) Cryptography

c) Brute-Force Attack

d) SQL Injection
21. Which of the following is a vulnerability scanning tool?

a) Metasploit

b) Nmap

c) Wireshark

d) Cain & Abel

22. Which of the following is a technique used to prevent unauthorized access


to a network?

a) Encryption

b) Firewall

c) DMZ

d) VLAN

23. Which of the following is a web application vulnerability?

a) Cross-site scripting (XSS)

b) DNS spoofing

c) SYN flood

d) Ping of Death

24. Which of the following is NOT an example of social engineering?

a) Phishing

b) Shoulder surfing

c) Denial of Service

d) Tailgating
25. Which of the following is a technique used to detect network vulnerabilities
by analyzing network traffic?

a) Penetration testing

b) Vulnerability scanning

c) Packet sniffing

d) Hash cracking

26. Which of the following is NOT an example of a password attack?

a) Brute force

b) Dictionary

c) SQL injection

d) Rainbow table

27. Which of the following is NOT an example of a wireless network attack?

a) Rogue access point

b) Evil twin

c) Packet sniffing

d) SQL injection

28. Which of the following is a type of malware that is designed to spread


rapidly across a network?

a) Adware

b) Spyware

c) Trojan

d) Worm
29. If you click the login button on a webpage, what kind of request does the
browser generally send to the server?
A. An HTTP POST request
B. An HTTP GET request
C. An HTTP PUT request
D. An HTTP OPTIONS request

30. You have found a live system on IP-address 192.168.11.54. Which Nmap
command allows you to identify the target’s operating system?
A. nmap -oS 192.168.11.54
B. nmap -sn 192.168.11.54
C. nmap -O 192.168.11.54
D. nmap -sL 192.168.11.54

31. The attacker copies the target’s password file and then tries to crack
passwords in his system at a different location. What type of password attack
that performed?

A. Active Online Attack


B. Passive Online Attack
C. Non-Electronic Attack
D. Offline Attack

32. It is a kind of malware (malicious software) that gets activated upon users’
certain predefined actions. When activated, it can grant attackers unrestricted
access or control of all data stored on compromised information systems and
can cause potentially immense damage. Which of the following terms best
matches the definition?

A. Virus
B. Trojan
C. Ransomware
D. Worm

33. Server Administrator configures access settings for users to authenticate


first before accessing web pages. Which requirement of information security
is addressed by implementing the configuration?

A. Integrity
B. Availability
C. Confidentiality
D. Scalability
34. An organization allows employees to work from the outside network to
access the data for a specific purpose. Which technology should be
implemented to ensure data confidentiality as data is transmitted?

A. Telnet
B. VLAN
C. WPA2
D. VPN

35. Attackers use image files to hide some information for malicious purposes.
What type of technique did the attacker perform?

A. Spyware
B. Cryptography
C. Steganography
D. Backdoor

36. Which Intrusion Detection System is the best applicable to analyze the
system’s behavior for Desktop PC or Server?

A. HIDS
B. NIDS
C. Firewall
D. Antivirus

37. What is the purpose of a demilitarized zone on a network?

A. Protecting the network devices


B. Provide detection for malicious traffic on the network
C. Provide security on servers
D. Providing security to the internal network and only provide direct access to DMZ
nodes

38. Which of the following types of firewall inspects specific traffic such as
http:get or post?

A. Packet filtering firewall


B. Application-level firewall
C. Circuit-level gateway firewall
D. Stateful Multilayer Inspection
39. The system administrator uses virus detection to prevent viruses on the
system. He uses a tool for monitoring system operation requests that are
written to disk. What is the virus detection method that the system
administrator performs?

A. Scanning
B. Interception
C. Code Emulation
D. Integrity Checking

40. Hyena is a tool to manages and secures Windows operating systems and
uses a Windows Explorer-style interface for all operations. It shows shares
and user login names for Windows servers and domain controllers. What is
the purpose of using this tool?

A. NETBIOS Enumeration
B. LDAP Enumeration
C. SNMP Enumeration
D. SMTP Enumeration

41. Hashing is generating a value or values from a string of text using a


mathematical function. Which of the following is assured by the use of a hash?

A. Confidentiality
B. Integrity
C. Availability
D. Authentication

42. Domain Name System (DNS) has a few types of records. One type of them
is AAAA Record. What is the purpose of the AAAA Record ?

A. IPv4 address resolution record


B. IPv6 address resolution record
C. Mail exchange record
D. Text record

43. CVSS is a published standard that provides an open framework for


communicating the characteristics and impacts of IT vulnerabilities. CVSS
assessment consists of three metrics for measuring vulnerabilities. Which of
the following is the best definition of base metric?

A. Represents the inherent qualities of a vulnerability


B. Represents the vulnerabilities that are based on a particular environment or
implementation
C. Represents the features that keep on changing during the lifetime of vulnerability
D. Represent the type of vulnerability
44. Which type of hacker performs an attack on the system by using tools and
knowledge found on the internet?

A. White Hat
B. Grey Hat
C. Black Hat
D. Script Kiddies

45. Which of the following OSI layers is the packet filtering firewall work on?

A. Application
B. Application, Presentation, Session
C. Physical, Data Link
D. Data Link, Network, Transport

46. The enormous usage of mobile devices has grabbed the attention of
attackers. Mobile devices access many of the resources that traditional
computers use. Apart from that, mobile devices also have some unique
features that add new attack vectors and protocols to the mix. Which of the
following are mobile attack vectors?

A. Malware
B. Data Exfiltration
C. Data Tampering
D. Data Breaking

47. Which of the following protocol used to ensure security in transferring files
across the network?

A. SSL
B. HTTP
C. TLS
D. SFTP

48. How to detect a honeypot that running on VMWare?

A. analysing outgoing packets


B. Looking for MAC Address range on IEEE standard
C. Looking for specific TCP/IP parameters such as TTL, RTT, and, TCP timestamp
D. using time-based TCP fingerprinting method
49. XYZ company uses 10.20.29.0/27 for the local network. Which of the
following subnet mask in this network?

A. 255.255.255.0
B. 255.255.255.252
C. 255.255.255.248
D. 255.255.255.224

50. In the Linux system, you want to view firewall logs to evaluate network
traffic. It would be best if you searched the specific logs with fast and efficient.
Which command-line utility are you most likely to use?

A. Notepad
B. Nano
C. Gedit
D. Grep

51. A pen-tester is attacking wireless networks using fake authentication and


ARP request injection. Which tools should be used by a pen-tester?

A. Aircrack-ng
B. Aireplay-ng
C. Airman-ng
D. Wireshark

52. It is the process of replacing unwanted bits in an image and its source files
with the secret data. Which of the term being described?

A. Spyware
B. Cryptography
C. Steganography
D. Backdoor

53. Which protocol is used for setting up secure channels between two
devices, typically in VPNs?

A. PPP
B. IPSEC
C. WPA
D. WEP
54. John the Ripper is a technical assessment tool used to test the weakness
of which of the following?

A. Usernames
B. File permissions
C. Firewall rulesets
D. Passwords

55. In what stage of Virus life does a stealth virus gets activated with the user
performing certain actions such as running an infected program?

 A. Design
 B. Elimination
 C. Incorporation
 D. Replication
 E. Launch
 F. Detection

56. What is a sniffing performed on a switched network called?

 A. Spoofed sniffing
 B. Passive sniffing
 C. Direct sniffing
 D. Active sniffing

57. A rootkit is a collection of tools (programs) that enable administrator-level access


to a computer. This program hides itself deep into an operating system for malicious
activity and is extremely difficult to detect. The malicious software operates in a
stealth fashion by hiding its files, processes and registry keys and may be used to
create a hidden directory or folder designed to keep out of view from a user's
operating system and security software.
What privilege level does a rootkit require to infect successfully on a Victim's
machine?

 A. User level privileges


 B. Ring 3 Privileges
 C. System level privileges
 D. Kernel level privileges

58. Which Steganography technique uses Whitespace to hide secret


messages?

 A. snow
 B. beetle
 C. magnet
 D. cat
59. Cyber Criminals have long employed the tactic of masking their true
identity. In IP spoofing, an attacker gains unauthorized access to a computer
or a network by making it appear that a malicious message has come from a
trusted machine, by "spoofing" the IP address of that machine.
How would you detect IP spoofing?

 A. Check the IPID of the spoofed packet and compare it with TLC checksum.
If the numbers match then it is spoofed packet
 B. Probe a SYN Scan on the claimed host and look for a response SYN/FIN
packet, if the connection completes then it is a spoofed packet
 C. Turn on 'Enable Spoofed IP Detection' in Wireshark, you will see a flag tick
if the packet is spoofed
 D. Sending a packet to the claimed host will result in a reply. If the TTL in the
reply is not the same as the packet being checked then it is a spoofed packet

60. David is a security administrator working in Boston. David has been asked
by the office's manager to block all POP3 traffic at the firewall because he
believes employees are spending too much time reading personal email. How
can David block POP3 at the firewall?

 A. David can block port 125 at the firewall.


 B. David can block all EHLO requests that originate from inside the office.
 C. David can stop POP3 traffic by blocking all HELO requests that originate
from inside the office.
 D. David can block port 110 to block all POP3 traffic.

61. You want to capture Facebook website traffic in Wireshark. What display
filter should you use that shows all TCP packets that contain the word
'facebook'?

 A. display==facebook
 B. traffic.content==facebook
 C. tcp contains facebook
 D. list.display.facebook
62. XSS attacks occur on Web pages that do not perform appropriate bounds
checking on data entered by users. Characters like < > that mark the
beginning/end of a tag should be converted into HTML entities.

What is the correct code when converted to html entities?

 A. Option A
 B. Option B
 C. Option C
 D. Option D

63. Most cases of insider abuse can be traced to individuals who are
introverted, incapable of dealing with stress or conflict, and frustrated with
their job, office politics, and lack of respect or promotion. Disgruntled
employees may pass company secrets and intellectual property to competitors
for monitory benefits.
Here are some of the symptoms of a disgruntled employee:
a. Frequently leaves work early, arrive late or call in sick
b. Spends time surfing the Internet or on the phone
c. Responds in a confrontational, angry, or overly aggressive way to simple
requests or comments d. Always negative; finds fault with everything
These disgruntled employees are the biggest threat to enterprise security.
How do you deal with these threats? (Select 2 answers)

 A. Limit access to the applications they can run on their desktop computers
and enforce strict work hour rules
 B. By implementing Virtualization technology from the desktop to the data
centre, organizations can isolate different environments with varying levels of
access and security to various employees
 C. Organizations must ensure that their corporate data is centrally managed
and delivered to users just and when needed
 D. Limit Internet access, e-mail communications, access to social networking
sites and job hunting portals

64. Fake Anti-Virus, is one of the most frequently encountered and persistent
threats on the web. This malware uses social engineering to lure users into
infected websites with a technique called Search Engine Optimization.
Once the Fake AV is downloaded into the user's computer, the software will
scare them into believing their system is infected with threats that do not
really exist, and then push users to purchase services to clean up the non-
existent threats.
The Fake AntiVirus will continue to send these annoying and intrusive alerts
until a payment is made.
What is the risk of installing Fake AntiVirus?

 A. Victim's Operating System versions, services running and applications


installed will be published on Blogs and Forums
 B. Victim's personally identifiable information such as billing address and
credit card details, may be extracted and exploited by the attacker
 C. Once infected, the computer will be unable to boot and the Trojan will
attempt to format the hard disk
 D. Denial of Service attack will be launched against the infected computer
crashing other machines on the connected network

65. How would you describe an attack where an attacker attempts to deliver
the payload over multiple packets over long periods of time with the purpose
of defeating simple pattern matching in IDS systems without session
reconstruction? A characteristic of this attack would be a continuous stream
of small packets.

 A. Session Hijacking
 B. Session Stealing
 C. Session Splicing
 D. Session Fragmentation

66. Jake works as a system administrator at Acme Corp. Jason, an accountant


of the firm befriends him at the canteen and tags along with him on the pretext
of appraising him about potential tax benefits. Jason waits for Jake to swipe
his access card and follows him through the open door into the secure
systems area. How would you describe Jason's behavior within a security
context?

 A. Smooth Talking
 B. Swipe Gating
 C. Tailgating
 D. Trailing

67. While performing a ping sweep of a local subnet you receive an ICMP reply
of Code 3/Type
13 for all the pings you have sent out. What is the most likely cause of this?

 A. The firewall is dropping the packets


 B. An in-line IDS is dropping the packets
 C. A router is blocking ICMP
 D. The host does not respond to ICMP packets
68. Consider the following code:
URL:http://www.certified.com/search.pl?
text=<script>alert(document.cookie)</script>
If an attacker can trick a victim user to click a link like this, and the Web
application does not validate input, then the victim's browser will pop up an
alert showing the users current set of cookies. An attacker can do much more
damage, including stealing passwords, resetting your home page, or
redirecting the user to another Web site.
What is the countermeasure against XSS scripting?

 A. Create an IP access list and restrict connections based on port number


 B. Replace "<" and ">" characters with "& l t;" and "& g t;" using server scripts
 C. Disable Javascript in IE and Firefox browsers
 D. Connect to the server using HTTPS protocol instead of HTTP

69. What kind of OS fingerprinting approach examines the answer received after
sending specially constructed packets to the distant OS?

 A. Passive
 B. Reflective
 C. Active
 D. Distributive

70. Port 25 is open on a server, according to an NMAP scan. What danger


might this bring?

 A. Open printer sharing


 B. Web portal data leak
 C. Clear text authentication
 D. Active mail relay

71. Which of the following methods is used for passive reconnaissance


information gathering?

 A. Social engineering
 B. Network traffic sniffing
 C. Man in the middle attacks
 D. Publicly accessible sources

72. What must be produced in order to demonstrate security improvement


over time?

 A. Reports
 B. Testing tools
 C. Metrics
 D. Taxonomy of vulnerabilities
73.Which of the following applications typically targets Microsoft Office
software?

 A. Polymorphic virus
 B. Multipart virus
 C. Macro virus
 D. Stealth virus

74. Which claim about network firewalls preventing Web application assaults
is TRUE?

 A. Attacks can be stopped by network firewalls because they can identify


malicious HTTP traffic.
 B. Because ports 80 and 443 need to be opened, network firewalls cannot
stop assaults.
 C. If configured correctly, network firewalls can stop attacks.
 D. Network firewalls can’t stop assaults because setting them up is too
difficult.
75. In a DDoS attack, what communications channel is commonly used to
orchestrate the attack?

A) Internet Relay Chat (IRC)


B) MSN Messenger
C) ICMP
D) Google Talk

76. Which of the following best describes a web application?


A) Code designed to be run on the client
B) Code designed to be run on the server
C) SQL code for databases
D) Targeting of web services

77.__________ is a client-side scripting language.


A) JavaScript
B) ASP
C) ASP.NET
D) PHP

78. Which of the following is an example of a server-side scripting language?


A) JavaScript
B) PHP
C) SQL
D) HTML
79.__________ can be used to identify a web server.
A) Session hijacking
B) Banner grab
C) Traversal
D) Header analysis

80.Which of the following is an attribute used to secure a cookie?


A) Encrypt
B) Secure
C) HttpOnly
D) Domain

You might also like