Ethical Hacking MCQ

Ethical Hacking MCQ

  • Sharad Jaiswal
  • 23rd Nov, 2021

We have listed here the best Ethical Hacking MCQ Questions for your basic knowledge of Ethical Hacking. This Ethical Hacking MCQ Test contains 25+ Ethical Hacking Multiple Choice Questions. You have to select the right answer to every question to check your final preparation for Ethical Hacking MCQ Interview, Exam, or Placement drives.

Practice Best Ethical Hacking MCQ Questions:

1) What is the first phase of hacking?

  • A. Attack
  • B.Gaining access
  • C.Reconnaissance
  • D.Maintaining access

2) What is the full form of ITA-2000?

  • A. Information Tech Act-2000
  • B.Information Technology Act-2000
  • C.Indian Technology Act-2000
  • D.International Technology Act-2000

3) What is the meaning of NOP?

  • A. Network Operation
  • B.No Operation
  • C.No one Point
  • D.None of the above

4) In which year the Indian IT Act, 2000 got updated?

  • A. 2008
  • B.2010
  • C.2012
  • D.2018

5) What is the sequence of a TCP connection?

  • A. SYN-ACK
  • B.SYN-ACK-FIN
  • C.SYN-SYN-ACK
  • D.SYN-SYN ACK-ACK

6) Keyloggers are a form of________

  • A. Trojan
  • B.Spyware
  • C.Shoulder surfing
  • D.Social engineering

7) What port is used to connect to the Active Directory in Windows 2000?

  • A. 139
  • B.225
  • C.389
  • D.445

8) What are the three types of scanning?

  • A. Port, network, and services
  • B.Port, network, and vulnerability
  • C.Grey, black, and white hat
  • D.Server, client, and network

9) Hacking for a cause is called______

  • A. Activism
  • B.Active hacking
  • C.Hacktivism
  • D.Black-hat hacking

10) To hide information inside a picture, what technology is used?

  • A. Rootkits
  • B.Bitmapping
  • C.Steganography
  • D.Image Rendering

11) What will an open port return from an ACK scan?

  • A. FIN
  • B.ACK
  • C.RST
  • D.None of the above

12) What is the attack called “evil twin”?

  • A. Rogue access point
  • B.ARP poisoning
  • C.MAC spoofing
  • D.Session hijacking

13) Which form of encryption does WPA use?

  • A. LEAP
  • B.TKIP
  • C.Shared key
  • D.None of the above

14) What are the forms of password cracking techniques is

  • A. Infrastructure
  • B.XMAS
  • C.phishing
  • D.sync

15) What is the primary goal of an ethical hacker?

  • A. Resolving security vulnerabilities
  • B.Maintaining access
  • C.Reconnaissance
  • D.Activism

16) What are the four Regional internet registries?

  • A. APNIC, PICNIC, NANIC, ARIN
  • B.APNIC, MOSTNIC, ARIN, RIPE NCC
  • C.APNIC, LACNIC, ARIN, RIPE NCC
  • D.APNIC, PICNIC, NANIC, RIPE NCC

17) HTTPs uses which port number?

  • A. 21
  • B.53
  • C.80
  • D.443

18) What is Maximum Length of an SSID?

  • A. Eight Character
  • B.Sixteen Character
  • C.Thirty-Two Character
  • D.Twenty-Four Character

19) Which of the following is a passive wireless discovery tool?

  • A. Kismet
  • B.Aircrack
  • C.Netsniff
  • D.NetStumbler

20) What is the preferred communications method used with systems on a bot-net?

  • A. E-mail
  • B.ICMP
  • C.IRC
  • D.TFTP

21) Tools used by ethical hackers are .................

  • A. Nmap
  • B.Metasploit
  • C.Aircrack-Ng
  • D.All of the above

22) Which type of hacker represents the highest risk to your network?

  • A. Script kiddies
  • B.Grey-hat hackers
  • C.Black-hat hackers
  • D.Disgruntled employees

23) Ethical hacking is also known as ....................

  • A. White hat Hacking
  • B.Penetration Testing
  • C.Both white hat hacking & penetration testing
  • D.None of the above

24) Banner grabbing is an example of what?

  • A. Footprinting
  • B.Application analysis
  • C.Active operating system fingerprinting
  • D.Passive operating system fingerprinting

25) When a hacker attempts to attack a host via the internet is called .....................

  • A. Local access
  • B.Internal attack
  • C.Remote attack
  • D.None of the above

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.

Related MCQ/Quiz

01st
Nov
Fiber Optics MCQ
01st
Nov
5G MCQ Questions
01st
Aug
Powerpoint MCQ
01st
Nov
JSF MCQ