Google News
logo
Ethical Hacking - Quiz(MCQ)
A)
Rene Carmille
B)
Henri Dentz
C)
Charles Platon
D)
Marcel Deslaurens

Correct Answer : Option (A) :   Rene Carmille


Explanation : The French experience in World War II is also instructive. Some credit René Carmille as the first ethical hacker because he stalled Nazi demands to get France’s Jewish population registered by machine. 

A)
Ankit Fadia
B)
Gary McKinnon
C)
Kevin Mitnick
D)
Tsutomu Shimomura

Correct Answer : Option (C) :   Kevin Mitnick


Explanation : Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.

A)
1950-54
B)
1955-60
C)
1965-67
D)
1970-80

Correct Answer : Option (B) :   1955-60


Explanation : The term came to origin in the year 1960s when very highly skilled professionals and individuals practice complex programming approaches to solve different problems.

A)
MIT
B)
California
C)
Bell’s Lab
D)
Stanford University

Correct Answer : Option (A) :   MIT


Explanation : At MIT (Massachusetts Institute of Technology), the term ‘hacker’ first came into origin because individuals and high skilled professionals solve different problems using programming languages. Some similar terms were also coined in this regard such as – geeks & nerds.

A)
Cracking Phone calls
B)
Breaking Other’s system
C)
Learning new Languages
D)
Voracious thirst for knowledge

Correct Answer : Option (D) :   Voracious thirst for knowledge


Explanation : Hackers of the old era were considered the most influential individuals of society with intellectual learning inclination and thirst for knowledge.

A)
1991
B)
1992
C)
1993
D)
1994

Correct Answer : Option (C) :   1993


Explanation : The first ever internationally recognized hacker’s conference took place in the year 1993 at Las Vegas, Nevada.

A)
Forensic Analysis Tool
B)
Format Allocation Test
C)
File Allocation Transfer
D)
File Allocation Tables

Correct Answer : Option (D) :   File Allocation Tables


Explanation : File Allocation Table (FAT) is a file system developed for personal computers. Originally developed in 1977 for use on floppy disks, it was adapted for use on hard disks and other devices. It is often supported for compatibility reasons by current operating systems for personal computers and many mobile devices and embedded systems, allowing interchange of data between disparate systems.

A)
ApplicationsHiding
B)
PrivilegesExecuting
C)
Files Covering Tracks
D)
All of the Above

Correct Answer : Option (D) :   All of the Above

A)
Threat
B)
Attack
C)
Exploit
D)
Vulnerability

Correct Answer : Option (A) :   Threat


Explanation : Threat can be termed as a possible danger that may lead to breach the cyber security and may cause possible harm to the system or the network.

A)
Attack
B)
Exploit
C)
Threat
D)
Vulnerability

Correct Answer : Option (D) :   Vulnerability


Explanation : Vulnerability is the term used to define weakness in any network or system that can get exploited by an attacker. Exploiting the weakness can lead to the unexpected & undesirable event in cyber security.

A)
Data Hack
B)
Data Breach
C)
Data infiltration
D)
Information compromise

Correct Answer : Option (B) :   Data Breach


Explanation : Data breach is the term used when the cyber-security incident takes place where sensitive information is accessed without authority.

A)
MAC spoofing
B)
ARP poisoning
C)
Rogue access point
D)
Session hijacking

Correct Answer : Option (C) :   Rogue access point


Explanation : The attack called “evil twin" is Rogue access point.

A)
AttackSyllable
B)
AttacksHybrid
C)
AttackBrute Forcing
D)
All of the Above

Correct Answer : Option (D) :   All of the Above

A)
Avoiding detection
B)
Testing security controls
C)
Resolving Security Vulnerabilities
D)
Determining return on investment for security measures

Correct Answer : Option (C) :   Resolving Security Vulnerabilities

A)
Scanning
B)
Gaining access
C)
Reconnaissance
D)
Maintaining access

Correct Answer : Option (A) :   Scanning


Explanation : Scanning is the first phase of hacking.

A)
BSS
B)
Ad hoc
C)
Infrastructure
D)
Point to Point

Correct Answer : Option (B) :   Ad hoc


Explanation : Ad hoc wireless mode connects machines directly to one another, without the use of an access point.

A)
Best Evidence
B)
Conclusive Evidence
C)
Hearsay Evidence
D)
Secondary Evidence

Correct Answer : Option (B) :   Conclusive Evidence

A)
1029 and 1030
B)
2510 and 1029
C)
2510 and 2701
D)
1030 and 2701

Correct Answer : Option (D) :   1030 and 2701

A)
OSCON
B)
SECCON
C)
DEVCON
D)
DEFCON

Correct Answer : Option (D) :   DEFCON


Explanation : DEFCON is one of the most popular and largest hacker’s as well as a security consultant’s conference that takes place every year in Las Vegas, Nevada, where government agents, security professionals, black and white hat hackers from all over the world attend that conference.

A)
Cracking
B)
Phishing
C)
Phreaking
D)
Spamming

Correct Answer : Option (C) :   Phreaking


Explanation : Phreaking which is abbreviated as phone-hacking is a slang term and old hacking technique where skilled professionals study, explore & experiment telephone networks in order to acquire the free calling facility.

A)
1878
B)
1885
C)
1890
D)
1896

Correct Answer : Option (A) :   1878


Explanation : The first hacking (related to telephone technology) was done when the phone company – named Bell Telephone started in the year 1878.

A)
1962
B)
1967
C)
1970
D)
1974

Correct Answer : Option (C) :   1970


Explanation : For hackers 1970 was that era when hackers and cyber criminals figured out how wired technologies work and how these technologies can be exploited in order to gain additional advantage or misuse the technology.

A)
Steve Jobs
B)
John Draper
C)
Kevin Mitnick
D)
Steve Wozniak

Correct Answer : Option (B) :   John Draper


Explanation : In the year 1971, a Vietnam guy name John Draper figured it out as how to make phone calls free of cost. This type of phone hacking is termed Phreaking.

A)
Attack
B)
Threat
C)
Vulnerability
D)
Target of Evaluation

Correct Answer : Option (D) :   Target of Evaluation


Explanation : Target of Evaluation is the term used when any IT infrastructure, system, network require evaluation for security reasons or for fixing any bugs after being tested by penetration testers.

A)
Surveillance
B)
Hacktivism
C)
Whistle-blowing
D)
Pseudonymization

Correct Answer : Option (B) :   Hacktivism


Explanation : Hacktivism is an act of defacing a website, or any network or system. Systems and networks are compromised with a political or social agenda.

A)
Social Engineering
B)
Insecure Network
C)
Reverse Engineering
D)
Cross Site Scripting

Correct Answer : Option (A) :   Social Engineering


Explanation : Using social engineering techniques, hackers try to exploit the victim’s mind to gain valuable information about that person such as his/her phone number, date of birth, pet name etc.

A)
Phishing
B)
Tailgating
C)
Spamming
D)
Pretexting

Correct Answer : Option (C) :   Spamming


Explanation : Spamming is the attack technique where the same message is sent indiscriminately repeatedly in order to overload the inbox or harm the user.

A)
Vishing
B)
Phishing
C)
Pretexting
D)
Spamming

Correct Answer : Option (C) :   Pretexting


Explanation : In the pretexting technique of social engineering, the attacker pretends in need of legitimate information from the victim for confirming his/her identity.

A)
High Patience
B)
Low Perseverance
C)
Lack of Understanding
D)
Weak Programming Skills

Correct Answer : Option (A) :   High Patience


Explanation : High Patience, Persistence, Perseverance, and up-to-date with the latest technological updates and their flaws are some of the major qualities, an ethical Hacker must need to have.

A)
Injecting code
B)
Reverse engineering
C)
Planting malware
D)
Social Engineering

Correct Answer : Option (B) :   Reverse engineering


Explanation : Reverse engineering is the technique used to enable a hacker to open a piece of program or application (usually in a low-level language such as Assembly language) and re-build it with further features & capabilities.

A)
Initialization vectors are large, get reused frequently, and are sent in cleartext
B)
Initialization vectors are large, get reused frequently, but are encrypted during transmission
C)
Initialization vectors are small, get reused frequently, but are encrypted during transmission
D)
Initialization vectors are small, get reused frequently, and are sent in cleartext

Correct Answer : Option (D) :   Initialization vectors are small, get reused frequently, and are sent in cleartext

A)
Netsniff
B)
Kismet
C)
Aircrack
D)
NetStumbler

Correct Answer : Option (B) :   Kismet

A)
Offline attack
B)
Active online attack
C)
Passive online attack
D)
None of the Above

Correct Answer : Option (A) :   Offline attack

A)
ICMP
B)
TFTP
C)
IRC
D)
E-Mail

Correct Answer : Option (C) :   IRC

A)
8 characters
B)
16 characters
C)
32 characters
D)
64 characters

Correct Answer : Option (C) :   32 characters

A)
Resets the TCP Connection
B)
Starts a TCP Connection
C)
Finishes TCP Connections
D)
Restores the Connection to a Previous State

Correct Answer : Option (A) :   Resets the TCP Connection

A)
John Draper
B)
Kevin Poulsen
C)
Kevin Mitnick
D)
Jon von Neumann

Correct Answer : Option (B) :   Kevin Poulsen


Explanation : The ARPANET (Advanced Research Project Agency Network) got hacked by Kevin Poulsen as he breaks into the Pentagon network and their associated system but got caught immediately in the year 1983.

A)
Scott Fahlman
B)
Richard Stallman
C)
Andrew Tannenbaum
D)
William Gibson

Correct Answer : Option (D) :   William Gibson


Explanation : In the year 1821, an American – Canadian fiction pioneer cum writer, William Gibson explored the different streams of technologies and coined the term “cyberspace”. The term defines interconnected technologies that help in sharing information, interact with digital devices, storage and digital entertainment, computer and network security and stuff related to information technology.

A)
1984
B)
1982
C)
1980
D)
1978

Correct Answer : Option (D) :   1978


Explanation : TCP/IP suite needs prior security as it is one of the most popularly used protocol suites and hence some computer scientists in the year 1978, attempts to integrate the security algorithms though they face many impediments in this regard.

A)
1984
B)
1985
C)
1986
D)
1987

Correct Answer : Option (A) :   1984


Explanation : This Cyber security bill got passed in the US in the year 1984 keeping this in concern that any computer related crimes do not go unpunished. This law also restricts users from unauthorized access of computer or data associated with it.

A)
Data Breaching
B)
Personal Data Copying
C)
Doxing
D)
Secure File Transferring Protocol

Correct Answer : Option (C) :   Doxing


Explanation : When an identity of internet user is discovered and published by following his/her details over the internet is called doxing.

A)
WI-FI network
B)
Emails
C)
Operating systems
D)
Surveillance camera

Correct Answer : Option (B) :   Emails


Explanation : In a phishing attack, the attacker fraudulently attempts to obtain sensitive data (such as username & passwords) of the target user and use emails to send fake links which redirect them to a fake webpage which looks legitimate.

A)
Persistence
B)
Creative thinking
C)
Smart attacking potential
D)
Problem-solving capability

Correct Answer : Option (C) :   Smart attacking potential


Explanation : Every hacker must possess some intangible skill-set such as creative thinking to process out a new way of penetrating a system, problem-solving skills as to cease down any active attack and persistence, try in different ways without losing hope.

A)
Only to write malware
B)
To teach programming
C)
To develop programs to harm others
D)
For solving problems and building tool and programs

Correct Answer : Option (D) :   For solving problems and building tool and programs


Explanation : A programming language is important for hackers and security professionals to understand so that they can understand the working behaviour of any virus, ransomware, or other malware, or write their own defense code to solve a problem. Nowadays, security tools and malware are developed by security professionals with high skills and knowledge.

A)
Networking
B)
Hardware
C)
Email-Servers
D)
Operating System

Correct Answer : Option (A) :   Networking


Explanation : A proper understanding of networking is very important for hackers who are trying to gain access to a system through networks. How TCP/IP works, how topologies are formed and what protocols are used for what purposes are some mandatory stuff a hacker or security professional must understand.

A)
F#
B)
SQL
C)
Tcl
D)
HTML

Correct Answer : Option (B) :   SQL


Explanation : For hacking a database or accessing and manipulating data, a hacker must need to have the knowledge of SQL (Structured Query Language). From a hacker’s perspective, if you’ve accessed any database for short period of time and want to change some specific data, you must need to write a proper SQL query to search for or implement your hack faster.

A)
privacy and security
B)
hacking techniques
C)
rules and regulations
D)
ethics to talk to seniors

Correct Answer : Option (A) :   privacy and security


Explanation : A penetration tester must keep in mind the privacy & security requirements as well as policies of a firm while evaluating the security postures of the target, which is called as “industry and business ethics policies”.

A)
Social ethics
B)
Cyber-bullying
C)
Cyber-ethics
D)
Corporate behaviour

Correct Answer : Option (C) :   Cyber-ethics


Explanation : Cyber-ethics and knowledge of proper ethical aspects while doing penetration tests helps to classify arguments and situations, better understand a cyber crime and helps to determine appropriate actions.

A)
To hack a system without the permission
B)
To hack a network that is vulnerable
C)
To corrupt software or service using malware
D)
To think like hackers and know how to defend such attacks

Correct Answer : Option (D) :   To think like hackers and know how to defend such attacks

A)
SSID
B)
BSSID
C)
MSSID
D)
RSSID

Correct Answer : Option (B) :   BSSID

A)
Hack
B)
Attack
C)
Offense
D)
Exploit

Correct Answer : Option (D) :   Exploit

A)
Network Scanner
B)
File Scanner
C)
Code Scanner
D)
Malware Scanner

Correct Answer : Option (A) :   Network Scanner


Explanation : Nmap is a network scanning tool—an open source Linux command-line tool—used for network exploration, host discovery, and security auditing. Gordon Lyon (pseudonym Fyodor Vaskovich) created it to help map an entire network easily and find its open ports and services.

A)
NAT
B)
NAT NETWORK
C)
BRIDGE NETWORK
D)
INTERNAL NETWORK

Correct Answer : Option (A) :   NAT

A)
Bettercap iface eth0
B)
Bettercap caplet automate.cap
C)
Bettercap -iface eth0
D)
Bettercap -caplet automate.cap

Correct Answer : Option (C) :   Bettercap -iface eth0

A)
Show payload
B)
Show payloads
C)
List payload
D)
List payloads

Correct Answer : Option (B) :   Show payloads

A)
Code Data Multiple Access
B)
Code Data Management Authority
C)
Code Division Multiple Access
D)
None of the Above

Correct Answer : Option (C) :   Code Division Multiple Access


Explanation : CDMA stands for “Code Division Multiple Access.” GSM stands for “Global System for Mobiles.” They are 2 radio networks used by wireless carriers.

A)
Network
B)
Physical
C)
Transport
D)
Datalink

Correct Answer : Option (D) :   Datalink

A)
It is used to test how good security is on your network.
B)
It is used to recover the loss of information, especially when you lost your password.
C)
It is used to perform penetration testing to increase the security of the computer and network.
D)
All of the Above

Correct Answer : Option (D) :   All of the Above

A)
Penetration Testing
B)
Encryption
C)
Decryption
D)
Cryptography

Correct Answer : Option (A) :   Penetration Testing

A)
Worms
B)
Malware
C)
Automated apps
D)
Database software

Correct Answer : Option (B) :   Malware

A)
Local Access
B)
Internal Attack
C)
Remote Attack
D)
Physical Access

Correct Answer : Option (C) :   Remote Attack

A)
APNIC, PICNIC, NANIC, ARIN
B)
APNIC, MOSTNIC, ARIN, RIPE NCC
C)
APNIC, LACNIC, ARIN, RIPE NCC
D)
APNIC, PICNIC, NANIC, RIPE NCC

Correct Answer : Option (C) :   APNIC, LACNIC, ARIN, RIPE NCC


Explanation : The four Internet registries are ARIN (American Registry of Internet Numbers), RIPE NCC (Europe, the Middle East, and parts of Central Asia), LACNIC (Latin American and Caribbean Internet Addresses Registry), and APNIC (Asia Pacific Network Information Centre).

A)
Social ethics
B)
Corporate ethics
C)
Ethics in cyber-security
D)
Ethics in black hat hacking

Correct Answer : Option (D) :   Ethics in black hat hacking


Explanation : Ethics in cyber-security is the branch of cyber security that deals with morality and provides different theories and principles’ regarding the view-points about what is right and what need not to be done.

A)
Penetration Testing
B)
Hacking
C)
Cracking
D)
Exploiting

Correct Answer : Option (A) :   Penetration Testing


Explanation : It is against the laws and ethics of ethical hackers that after doing penetration tests, the ethical hacker should never disclose client information to other parties. The protection of client data is in the hands of the ethical hacker who performed the tests.

A)
System and network
B)
Know the nature of the organization
C)
Characteristics of work done in the firm
D)
Type of broadband company used by the firm

Correct Answer : Option (D) :   Type of broadband company used by the firm


Explanation :

Before performing any penetration test, through the legal procedure the key points that the penetration tester must keep in mind are :

i) Know the nature of the organization
ii) what type of work the organization do and
iii) the system and networks used in various departments and their confidential data that are sent and received over the network.

A)
deleting
B)
disclosure
C)
hacking
D)
stealing

Correct Answer : Option (B) :   disclosure


Explanation : The legal risks of ethical hacking contains lawsuits due to disclosure of personal data during the penetration testing phase. Such disclosure of confidential data may lead to a legal fight between the ethical hacker and the organization.

A)
Fixing Bugs
B)
Unethical Hacking
C)
Ethical Hacking
D)
Internal Data-Breach

Correct Answer : Option (C) :   Ethical Hacking


Explanation : Ethical hacking is that used by business organizations and firms for exploiting vulnerabilities to secure the firm. Ethical hackers help in increasing the capabilities of any organization or firm in protecting their IT and information assets.

A)
21
B)
53
C)
80
D)
443

Correct Answer : Option (D) :   443


Explanation : HTTPS uses TCP port 443. This is a well-known port number and can be found in the Windows services file.

A)
Footprinting
B)
Passive operating system fingerprinting
C)
Application analysis
D)
Active operating system fingerprinting

Correct Answer : Option (B) :   Passive operating system fingerprinting


Explanation : Banner grabbing is not detectible; therefore it is considered passive OS fingerprinting.

A)
Single quote
B)
Semicolon
C)
Dollar sign
D)
None of the Above

Correct Answer : Option (A) :   Single quote

A)
White hat Hacking
B)
Penetration Testing
C)
Both (A) and (B)
D)
None of the Above

Correct Answer : Option (C) :   Both (A) and (B)


Explanation : Ethical hacking is also known as white hat hacking & penetration testing.

A)
whois
B)
ipconfig
C)
nslookup
D)
DNSlookup

Correct Answer : Option (C) :   nslookup


Explanation : nslookup tool can be used to perform a DNS zone transfer on Windows .

A)
Bill Landreth
B)
Vladimir Levin
C)
Richard Stallman
D)
Robert T. Morris

Correct Answer : Option (D) :   Robert T. Morris


Explanation : Robert Tappan Morris, a Cornell University graduate student developed Morris Worm in 1988 and was accused of the crime (under US Computer Fraud and Abuse Act.) for spreading computer worms through Internet.

A)
PGP (Protected Good Privacy)
B)
PGP (Pretty Good Privacy)
C)
DES (Data Encryption Standard)
D)
AES (Advanced Encryption Standard)

Correct Answer : Option (B) :   PGP (Pretty Good Privacy)


Explanation : This encryption program package name PGP (Pretty Good Privacy) became popular across the globe because it helps in providing authentication in data communication as well as help in maintaining privacy through cryptographic algorithms by encryption & decryption of plain texts (in emails and files) to cipher texts and vice versa.

A)
Baiting
B)
Phishing
C)
Pretexting
D)
Piggybacking

Correct Answer : Option (D) :   Piggybacking


Explanation : Piggybacking is the technique used for social engineering, as the attacker or unauthorized person/individual follows behind an authorized person/employee & gets into an authorized area to observe the system, gain confidential data or for a fraudulent purpose.

A)
True
B)
False
C)
--
D)
--

Correct Answer : Option (B) :   False


Explanation : Physical hacking, like other types of hacking, is possible in any institutions, organizations, clinics, private firms, banks or any other financial institutions. Hence, the above statement is false.

A)
Physical accessing
B)
Remote accessing
C)
Network accessing
D)
Database accessing

Correct Answer : Option (A) :   Physical accessing


Explanation : Physical accessing without prior security checking is the ability of a person to gain access to any authorized area. Physical accessing is done using piggybacking or any other suspicious means.

A)
Create a phishing policy
B)
Add front desk & restrict unknown access to the back room
C)
Updating the patches in the software you’re working at your office laptop.
D)
Analyze how employees maintain their physical data and data storage peripheral devices

Correct Answer : Option (C) :   Updating the patches in the software you’re working at your office laptop.


Explanation : Updating the patches in your working software does not come under security measures for physical hacking. Updating the patches will help your software get free from bugs and flaws in an application as they get a fix when patches are updated.

A)
Phishing
B)
Sneak-in
C)
Break-in and steal
D)
Walk-in using piggybacking

Correct Answer : Option (A) :   Phishing


Explanation : Phishing does not come under physical security. Walk-in without proper authorization, sneaking in through glass windows or other means and breaking in and stealing sensitive documents are examples of physical hacking.

A)
a good
B)
a bad
C)
not so good
D)
very good social engineering practice

Correct Answer : Option (B) :   a bad


Explanation : Overlooking or peeping into someone’s system when he/she is entering his/her password is a bad practice and is against the ethics of conduct for every individual. Shoulder surfing is a social engineering attack approach used by some cyber-criminals to know your password and gain access to your system later.