Ethical hacking questions
Ethical hacking questions
Question Bank
b) Implementing a firewall
c) Input validation
a) Smurf attack
b) SQL injection
c) Cross-site scripting
d) Port scanning
a) Pretexting
b) Phishing
c) Shoulder surfing
d) SQL injection
5. Which of the following is an example of a passive network reconnaissance
technique?
a) Port scanning
b) Ping sweep
c) Banner grabbing
d) Sniffing
a) AES
b) RSA
c) SHA
d) SQL
a) Input validation
c) Man-in-the-middle attack
a) Fuzz testing
b) Penetration testing
c) Vulnerability scanning
A) Pretexting
B) Phishing
C) Vishing
D) Port Scanning
A) Metasploit
B) Nikto
C) Nessus
D) Wireshark
11. What type of attack is designed to exhaust a network's resources and deny
access to legitimate users?
A) Smurf attack
B) SQL injection
C) Cross-site scripting
D) Social engineering
A) AES
B) RSA
C) SHA-1
D) Blowfish
13. Which of the following is a method used to hide a message or file inside
another message or file?
A) Steganography
B) Cryptography
C) Hashing
D) Brute-force attack
a) Phishing
b) Shoulder surfing
c) Bluejacking
d) Spoofing
a) Cross-site scripting
b) SQL injection
c) DNS spoofing
d) Shellcode injection
a) Scanning
b) Enumeration
c) Fuzzing
d) Exploitation
17. Which of the following is a technique used by attackers to gain access to a
system by exploiting a weakness in the system's authentication mechanism?
a) Password spraying
b) Port scanning
c) Ping of Death
d) DNS rebinding
18. Which of the following is a technique used by attackers to hide their tracks
by erasing evidence of their activities from log files?
a) SQL injection
b) Privilege escalation
c) Fileless malware
d) Log tampering
a) Port Scanning
b) Social Engineering
c) Sniffing
d) SQL Injection
20. Which of the following is a technique used to hide data in plain sight?
a) Steganography
b) Cryptography
c) Brute-Force Attack
d) SQL Injection
21. Which of the following is a vulnerability scanning tool?
a) Metasploit
b) Nmap
c) Wireshark
a) Encryption
b) Firewall
c) DMZ
d) VLAN
b) DNS spoofing
c) SYN flood
d) Ping of Death
a) Phishing
b) Shoulder surfing
c) Denial of Service
d) Tailgating
25. Which of the following is a technique used to detect network vulnerabilities
by analyzing network traffic?
a) Penetration testing
b) Vulnerability scanning
c) Packet sniffing
d) Hash cracking
a) Brute force
b) Dictionary
c) SQL injection
d) Rainbow table
b) Evil twin
c) Packet sniffing
d) SQL injection
a) Adware
b) Spyware
c) Trojan
d) Worm
29. If you click the login button on a webpage, what kind of request does the
browser generally send to the server?
A. An HTTP POST request
B. An HTTP GET request
C. An HTTP PUT request
D. An HTTP OPTIONS request
30. You have found a live system on IP-address 192.168.11.54. Which Nmap
command allows you to identify the target’s operating system?
A. nmap -oS 192.168.11.54
B. nmap -sn 192.168.11.54
C. nmap -O 192.168.11.54
D. nmap -sL 192.168.11.54
31. The attacker copies the target’s password file and then tries to crack
passwords in his system at a different location. What type of password attack
that performed?
32. It is a kind of malware (malicious software) that gets activated upon users’
certain predefined actions. When activated, it can grant attackers unrestricted
access or control of all data stored on compromised information systems and
can cause potentially immense damage. Which of the following terms best
matches the definition?
A. Virus
B. Trojan
C. Ransomware
D. Worm
A. Integrity
B. Availability
C. Confidentiality
D. Scalability
34. An organization allows employees to work from the outside network to
access the data for a specific purpose. Which technology should be
implemented to ensure data confidentiality as data is transmitted?
A. Telnet
B. VLAN
C. WPA2
D. VPN
35. Attackers use image files to hide some information for malicious purposes.
What type of technique did the attacker perform?
A. Spyware
B. Cryptography
C. Steganography
D. Backdoor
36. Which Intrusion Detection System is the best applicable to analyze the
system’s behavior for Desktop PC or Server?
A. HIDS
B. NIDS
C. Firewall
D. Antivirus
38. Which of the following types of firewall inspects specific traffic such as
http:get or post?
A. Scanning
B. Interception
C. Code Emulation
D. Integrity Checking
40. Hyena is a tool to manages and secures Windows operating systems and
uses a Windows Explorer-style interface for all operations. It shows shares
and user login names for Windows servers and domain controllers. What is
the purpose of using this tool?
A. NETBIOS Enumeration
B. LDAP Enumeration
C. SNMP Enumeration
D. SMTP Enumeration
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
42. Domain Name System (DNS) has a few types of records. One type of them
is AAAA Record. What is the purpose of the AAAA Record ?
A. White Hat
B. Grey Hat
C. Black Hat
D. Script Kiddies
45. Which of the following OSI layers is the packet filtering firewall work on?
A. Application
B. Application, Presentation, Session
C. Physical, Data Link
D. Data Link, Network, Transport
46. The enormous usage of mobile devices has grabbed the attention of
attackers. Mobile devices access many of the resources that traditional
computers use. Apart from that, mobile devices also have some unique
features that add new attack vectors and protocols to the mix. Which of the
following are mobile attack vectors?
A. Malware
B. Data Exfiltration
C. Data Tampering
D. Data Breaking
47. Which of the following protocol used to ensure security in transferring files
across the network?
A. SSL
B. HTTP
C. TLS
D. SFTP
A. 255.255.255.0
B. 255.255.255.252
C. 255.255.255.248
D. 255.255.255.224
50. In the Linux system, you want to view firewall logs to evaluate network
traffic. It would be best if you searched the specific logs with fast and efficient.
Which command-line utility are you most likely to use?
A. Notepad
B. Nano
C. Gedit
D. Grep
A. Aircrack-ng
B. Aireplay-ng
C. Airman-ng
D. Wireshark
52. It is the process of replacing unwanted bits in an image and its source files
with the secret data. Which of the term being described?
A. Spyware
B. Cryptography
C. Steganography
D. Backdoor
53. Which protocol is used for setting up secure channels between two
devices, typically in VPNs?
A. PPP
B. IPSEC
C. WPA
D. WEP
54. John the Ripper is a technical assessment tool used to test the weakness
of which of the following?
A. Usernames
B. File permissions
C. Firewall rulesets
D. Passwords
55. In what stage of Virus life does a stealth virus gets activated with the user
performing certain actions such as running an infected program?
A. Design
B. Elimination
C. Incorporation
D. Replication
E. Launch
F. Detection
A. Spoofed sniffing
B. Passive sniffing
C. Direct sniffing
D. Active sniffing
A. snow
B. beetle
C. magnet
D. cat
59. Cyber Criminals have long employed the tactic of masking their true
identity. In IP spoofing, an attacker gains unauthorized access to a computer
or a network by making it appear that a malicious message has come from a
trusted machine, by "spoofing" the IP address of that machine.
How would you detect IP spoofing?
A. Check the IPID of the spoofed packet and compare it with TLC checksum.
If the numbers match then it is spoofed packet
B. Probe a SYN Scan on the claimed host and look for a response SYN/FIN
packet, if the connection completes then it is a spoofed packet
C. Turn on 'Enable Spoofed IP Detection' in Wireshark, you will see a flag tick
if the packet is spoofed
D. Sending a packet to the claimed host will result in a reply. If the TTL in the
reply is not the same as the packet being checked then it is a spoofed packet
60. David is a security administrator working in Boston. David has been asked
by the office's manager to block all POP3 traffic at the firewall because he
believes employees are spending too much time reading personal email. How
can David block POP3 at the firewall?
61. You want to capture Facebook website traffic in Wireshark. What display
filter should you use that shows all TCP packets that contain the word
'facebook'?
A. display==facebook
B. traffic.content==facebook
C. tcp contains facebook
D. list.display.facebook
62. XSS attacks occur on Web pages that do not perform appropriate bounds
checking on data entered by users. Characters like < > that mark the
beginning/end of a tag should be converted into HTML entities.
A. Option A
B. Option B
C. Option C
D. Option D
63. Most cases of insider abuse can be traced to individuals who are
introverted, incapable of dealing with stress or conflict, and frustrated with
their job, office politics, and lack of respect or promotion. Disgruntled
employees may pass company secrets and intellectual property to competitors
for monitory benefits.
Here are some of the symptoms of a disgruntled employee:
a. Frequently leaves work early, arrive late or call in sick
b. Spends time surfing the Internet or on the phone
c. Responds in a confrontational, angry, or overly aggressive way to simple
requests or comments d. Always negative; finds fault with everything
These disgruntled employees are the biggest threat to enterprise security.
How do you deal with these threats? (Select 2 answers)
A. Limit access to the applications they can run on their desktop computers
and enforce strict work hour rules
B. By implementing Virtualization technology from the desktop to the data
centre, organizations can isolate different environments with varying levels of
access and security to various employees
C. Organizations must ensure that their corporate data is centrally managed
and delivered to users just and when needed
D. Limit Internet access, e-mail communications, access to social networking
sites and job hunting portals
64. Fake Anti-Virus, is one of the most frequently encountered and persistent
threats on the web. This malware uses social engineering to lure users into
infected websites with a technique called Search Engine Optimization.
Once the Fake AV is downloaded into the user's computer, the software will
scare them into believing their system is infected with threats that do not
really exist, and then push users to purchase services to clean up the non-
existent threats.
The Fake AntiVirus will continue to send these annoying and intrusive alerts
until a payment is made.
What is the risk of installing Fake AntiVirus?
65. How would you describe an attack where an attacker attempts to deliver
the payload over multiple packets over long periods of time with the purpose
of defeating simple pattern matching in IDS systems without session
reconstruction? A characteristic of this attack would be a continuous stream
of small packets.
A. Session Hijacking
B. Session Stealing
C. Session Splicing
D. Session Fragmentation
A. Smooth Talking
B. Swipe Gating
C. Tailgating
D. Trailing
67. While performing a ping sweep of a local subnet you receive an ICMP reply
of Code 3/Type
13 for all the pings you have sent out. What is the most likely cause of this?
69. What kind of OS fingerprinting approach examines the answer received after
sending specially constructed packets to the distant OS?
A. Passive
B. Reflective
C. Active
D. Distributive
A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
73.Which of the following applications typically targets Microsoft Office
software?
A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus
74. Which claim about network firewalls preventing Web application assaults
is TRUE?