Arjun Quiz
Arjun Quiz
What is a common term for software designed to infiltrate a computer system without
the owner's informed consent?
a) Adware
b) Freeware
c) Malware
d) Software
Answer: c) Malware
a) Virus
b) Worm
c) Phishing
d) Trojan
Answer: c) Phishing
3. In ethical hacking, what does the term "white hat" refer to?
a) Phishing
a) Baiting
c) SQL injection
d) Pretexting
7. What tool is used for wireless network cracking and is known to exploit the WPS
vulnerability?
a) AirSnort
b) Wireshark
c) Reaver
d) Burp Suite
Answer: c) Reaver
8. What kind of malware typically disguises itself as legitimate software and may be
used by hackers to gain unauthorized access?
a) Ransomware
b) Adware
c) Spyware
d) Trojan Horse
a) Metasploit
b) Nmap
c) Burp Suite
d) Hydra
Answer: b) Nmap
10. Which of the following terms describes an attack where an unauthorized user
attempts to gain access to a user's session?
a) Man-in-the-middle
b) Session hijacking
c) Directory traversal
12. Which cybersecurity principle suggests that a user should have the minimum levels
of access required to perform their roles?
a) Least Privilege
b) Defense in Depth
c) Segregation of Duties
d) Risk Diversification
a) HTTP
b) DNS
c) SSL/TLS
d) FTP
Answer: c) SSL/TLS
a) Secure
b) Socket
c) Session
d) Server
Answer: a) Secure
15. Which of these is NOT a type of penetration testing?
a) Black Box
b) Grey Box
c) Red Box
d) White Box
16. Which of the following is a wireless attack that involves setting up a rogue WiFi
access point and mimicking a legitimate one to capture data from unsuspecting users?
a) Deauthentication Attack
c) Karma Attack
d) Fragmentation Attack
17. In the context of a web application, which of the following best describes "Directory
Traversal"?
18. Which HTTP status code indicates that a resource is forbidden and the server will
not display details, even if authentication exists?
a) 401 Unauthorized
d) 403 Forbidden
a) Reporting
b) Attack
c) Reconnaissance
d) Purchasing
Answer: d) Purchasing
20. Cross-Site Request Forgery (CSRF) primarily targets which of the following?
a) Server-side applications
c) Network infrastructure
d) DNS servers