You are on page 1of 7

Ethical hacking

1. What is Ethical Hacking?

A. Hacking to steal sensitive information


B. Hacking to identify vulnerabilities in a system
C. Hacking to disrupt a system’s functionality
D. hacking to cause damage to a system
Answer: B
2. What is the main goal of ethical hacking?

A. To cause damage to a system


B. To gain unauthorized access to a system
C. To identify and fix security vulnerabilities
D. To steal sensitive information

Answer: C

3. Which of the following is not a common method used in ethical


hacking?

A. Social engineering
B. Penetration testing
C. SQL injection
D. Denial of service attack

Answer: D

4. What is a firewall?

A. A device used to prevent unauthorized access to a network


B. A device used to monitor network traffic
C. A device used to encrypt network traffic
D. A device used to block email spam
Ethical hacking

Answer: A

5. What is a zero-day vulnerability?

A. A vulnerability that has been identified and patched


B. A vulnerability that has been identified but not yet patched
C. A vulnerability that has never been identified
D. A vulnerability that does not exist

Answer: B

6. What is a backdoor?

A. A hidden entry point into a system or network


B. A tool used to remove malware from a system
C. A type of malware that spreads through email attachments
D. A tool used to scan a network for vulnerabilities

Answer: A

7. What is network mapping?

A. The process of identifying the devices and topology of a network


B. The process of encrypting network traffic
C. The process of hiding malicious activity on a network
D. The process of monitoring network traffic
Answer: A

8. What is a virtual private network (VPN)?

A. A device used to encrypt network traffic


B. A device used to monitor network traffic
Ethical hacking

C. A device used to block network traffic


D. A device used to analyze system logs
Answer: A
9. What is the difference between ethical hacking and malicious
hacking?

A. Ethical hacking is legal and sanctioned, while malicious hacking is illegal


and unsanctioned.
B. Ethical hacking only involves finding vulnerabilities, while malicious
hacking involves exploiting them.
C. Ethical hacking is done with the permission of the system owner, while
malicious hacking is done without permission.
D. There is no difference between ethical hacking and malicious hacking.

Answer: A

10. What is social engineering?

A. A technique to identify vulnerabilities in a system or network


B. A technique to exploit vulnerabilities in a system or network
C. A technique to manipulate people into giving up sensitive information
D. A technique to fix vulnerabilities in a system or network

Answer: C

11. What is SQL injection?

A. A technique to identify vulnerabilities in a system or network


B. A technique to exploit vulnerabilities in a system or network
C. A technique to fix vulnerabilities in a system or network
D. A technique to steal sensitive information from a system or network
Ethical hacking

Answer: B

12. What is the difference between a virus and a worm?

A. A virus spreads by attaching itself to a host file, while a worm spreads


by exploiting network vulnerabilities.
B. A virus is a type of malware that can replicate itself and spread to other
systems, while a worm is a standalone program that can replicate itself
and spread to other systems.
C. A virus requires human interaction to spread, while a worm can spread
automatically without user intervention.
D. There is no difference between a virus and a worm.

Answer: B

13. What is a denial-of-service attack?

A. An attack that floods a network with traffic to make it unavailable


B. An attack that steals sensitive information from a system
C. An attack that exploits a software vulnerability
D. An attack that intercepts communication between two parties

Answer: A

14. What is a password cracker?

A. A tool used to guess passwords through trial and error


B. A tool used to encrypt passwords for storage
C. A tool used to decrypt passwords for storage
D. A tool used to block password guessing attempts
Ethical hacking

Answer: A

15. What is a packet sniffer?

A. A tool used to capture and analyze network traffic


B. A tool used to block network traffic
C. A type of malware that spreads through a network
D. A tool used to encrypt network traffic

Answer: A

16. What is a rootkit?

A. A type of malware that encrypts files on a system


B. A type of software used to monitor network traffic
C. A type of software used to hide malicious activity on a system
D. A type of software used to perform brute force attacks

Answer: C

17. What is encryption?

A. A technique used to hide the contents of a message


B. A technique used to hide the identity of a sender
C. A technique used to hide the location of a sender
D. A technique used to hide the existence of a message

Answer: A

18. What is a botnet?

A. A network of compromised computers used for malicious purposes


B. A type of malware that steals sensitive information
Ethical hacking

C. A type of malware that encrypts files on a system


D. A type of attack that floods a network with traffic

Answer: A

19. What is a phishing attack?

A. An attack that exploits a software vulnerability


B. An attack that floods a network with traffic
C. An attack that steals sensitive information by tricking users into
providing it
D. An attack that intercepts communication between two parties

Answer: C

20. What is a brute-force attack?

A. An attack that intercepts communication between two parties


B. An attack that floods a network with traffic to make it unavailable
C. An attack that attempts every possible combination of characters to
guess a password
D. A type of malware that disguises itself as legitimate software

Answer: C
Ethical hacking

You might also like