5 TH Unit MCQS
5 TH Unit MCQS
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
Answer: b
Explanation: White Hat Hackers are cyber security analysts and consultants who have the intent to help
firms and Governments in the identification of loopholes as well as help to perform penetration tests for
securing a system.
2. Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
Answer: c
Explanation: Ethical Hacking is an ethical form of hacking done by white-hat hackers for performing
penetration tests and identifying potential threats in any organizations and firms.
3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cybercrimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
Answer: d
Explanation: Black Hat hackers also termed as „crackers‟and are a major type of cyber criminals who
take unauthorized access in user‟s account or system and steal sensitive data or inject malware into the
system for their profit or to harm the organization.
Page 1 of 12
5 unit Basics Of Ethical Hacking MCQS
4. The amateur or newbie in the field of hacking who don’t have many skills about coding and in-
depth working of security and hacking tools are called
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
Explanation: Script Kiddies are new to hacking and at the same time do not have many interests in
developing coding skills or find bugs of their own in systems; rather they prefer downloading of
available tools (developed by elite hackers) and use them to break any system or network. They just try
to gain attention of their friend circles.
6. Criminal minded individuals who work for terrorist organizations and steal information of
nations and other secret intelligence are
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
Answer: c
Explanation: Cyber Terrorists are very expert programmers and cyber criminals who hide themselves
while doing malicious activities over the internet and they are smart enough to hide themselves or their
tracks of action. They are hired for gaining unauthorized access to nation‟s data centres or break into
the network of intelligence agencies.
Page 2 of 12
5 unit Basics Of Ethical Hacking MCQS
7. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals are
termed as
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
Explanation: Whistleblowers are those individuals who is a member or an employee of any specific
organization and is responsible for disclosing private information of those organizations, firms, either
government or private.
8. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
Answer: b
Explanation: The tag “Elite hackers” are considered amongst the most reputed hackers who possess
most of the hacking and security skills. They are treated with utmost respect in the hackers‟community.
Zero day vulnerabilities, serious hacking tools and newly introduced bugs are found and developed by
them.
9. are those individuals who maintain and handles IT security in any firm or organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
Answer: a
Explanation: This is an intermediary level of position of an individual in an organization or firm who
builds and preserves different systems and its associated security tools of the firm of organization to
which he/she belongs.
Page 3 of 12
5 unit Basics Of Ethical Hacking MCQS
11. are senior level corporate employees who have the role and responsibilities of
creating and designing secured network or security structures.
a) Ethical Hackers b) Chief Technical Officer
c) IT Security Engineers d) Security Architect
Answer: d
Explanation: Security architect are those senior grade employees of an organization who are in charge
of building, designing, implementing and testing of secured network topologies, protocols as well as
secured computers in an organization.
Page 4 of 12
5 unit Basics Of Ethical Hacking MCQS
12. security consultants uses database security monitoring & scanning tools to
maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
Answer: a
Explanation: Database Security consultants are specific individuals hired in order to monitor and scan the
database systems and keep them secured from unwanted threats and attacks by giving access to
restricted users, blocking unwanted files, multi-factor access control etc.
13. Govern
ments hired some highly skilled hackers. These types of hackers are termed as
a) Special Hackers b) Government Hackers
c) Cyber Intelligence Agents d) Nation / State sponsored hackers
Answer: d
Explanation: Nation / State sponsored hackers are specific individuals who are employed or hired by the
government of that nation or state and protect the nation from cyber terrorists and other groups or
individuals and to reveal their plans, communications and actions.
14. Someone
(from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are
a) Black Hat hacker
b) External penetration tester
c) Blue Hat hacker
d) White Hat Hacker
Answer: c
Explanation: Blue Hat Hackers are outsiders yet security testers who are temporarily hired for
performing outsourced security test for bugs and vulnerabilities in any system before launching it to the
market or making the application live.
Page 6 of 12
5 unit Basics Of Ethical Hacking MCQS
17. is a code injecting method used for attacking the database of a system / website.
a) HTML injection
18. is a code injecting method used for attacking the database of a system / website.
b) HTML injection
c) SQL Injection
d)Malicious code injection
e) XML Injection
Answer: b
Explanation: SQLi (Structured Query Language Injection) is a popular attack where SQL code is
targeted or injected; for breaking the web application having SQL vulnerabilities. This allows the
attacker to run malicious code and take access to the database of that server.
20. This attack can be deployed by infusing a malicious code in a website’s comment section.
What is “this” attack referred to here?
a) SQL injection
b) HTML Injection
c) Cross Site Scripting (XSS)
d) Cross Site Request Forgery (XSRF)
Answer: c
Explanation: XSS attack can be infused by putting the malicious code (which gets automatically run) in
any comment section or feedback section of any webpage (usually a blogging page). This can hamper
the reputation of a site and the attacker may place any private data or personal credentials.
21. Whe
n there is an excessive amount of data flow, which the system cannot handle,
attack takes place.
a) Database crash attack
b) DoS (Denial of Service) attack
c) Data overflow Attack
d) Buffer Overflow attack
Answer: d
Explanation: The Buffer overflow attack takes place when an excessive amount of data occurs in the
buffer, which it cannot handle and lead to data being over-flow into its adjoined storage. This attack can
cause a system or application crash and can lead to malicious entry-point.
Page 7 of 12
5 unit Basics Of Ethical Hacking MCQS
22. Compromising a user’s session for exploiting the user’s
data and do malicious activities or misuse user’s credentials is called
a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
Answer: a
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an exploitation method
for compromising the user‟s session for gaining unauthorized access to user‟s information.
Page 8 of 12
5 unit Basics Of Ethical Hacking MCQS
25. An
attempt to harm, damage or cause threat to a system or network is broadly termed as
a)Cyber-crime
b)Cyber Attack
c)System hijacking
d)Digital crime
Answer: b
Explanation: Cyber attack is an umbrella term used to classify different computer & network attacks or activities
such as extortion, identity theft, email hacking, digital spying, stealing hardware, mobile hacking and physical
security breaching.
27. are the special type of programs used for recording and tracking user’s keystroke.
a)Keylogger
b)Trojans
c)Virus
d)Worms
Answer: a
Explanation: Keyloggers are surveillance programs developed for both security purpose as well as done for
hacking passwords and other personal credentials and information. This type of programs actually saves the
keystrokes done using a keyboard and then sends the recorded keystroke file to the creator of such programs.
Page 9 of 12
5 unit Basics Of Ethical Hacking MCQS
28. Stuxnet is a
a)Worm
b)Virus
c)Trojan
d)Antivirus
Answer: a
Explanation: Stuxnet is a popular and powerful worm that came into existence in mid 2010, which was very
powerful as it was accountable for the cause of huge damage to Iran‟s Nuclear program. It mainly targets
the PLCs (Programmable Logic Controllers) in a system.
29. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
a)Confidentiality
b)Integrity
c)Authenticity
d)Availability
Answer: c
Explanation: According to the CIA triad the three components that a security need is the Confidentiality,
Integrity, Availability (as in short read as CIA) .
30. is the latest technology that faces an extra challenge because of CIA paradigm.
a)Big data
b)Database systems
c)Cloud storages
d)Smart dust
Answer: a
Explanation: Big data has additional challenges that it has to face because of the tremendous volume of data
that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and
time-consuming.
32. is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
a)Network Security
b)Database Security
c)Information Security
d)Physical Security
Answer: c
Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for protecting
valuable information for alteration, destruction, deletion or disclosure by unauthorised users.
Page 10 of 12
5 unit Basics Of Ethical Hacking MCQS
33. From the options below, which of them is not a vulnerability to information security?
a)flood
b)without deleting data, disposal of storage media
c)unchanged default password
d)latest patches and updates not done
Answer: a
Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a
vulnerability to any system.
34. platforms are used for safety and protection of information in the cloud.
a)Cloud workload protection platforms
b)Cloud security protocols
c)AWS
d)One Drive
Answer: a
Explanation: Nowadays data centres support workloads from different geographic locations across the globe
through physical systems, virtual machines, servers, and clouds. Their security can be managed using Cloud
workload protection platforms which manage policies regarding security of information irrespective of its
location.
35. technology is used for analyzing and monitoring traffic in network and information flow.
a)Cloud access security brokers (CASBs)
b)Managed detection and response (MDR)
c)Network Security Firewall
d)Network traffic analysis (NTA)
Answer: d
Explanation: Network traffic analysis (NTA) is an approach of information security for supervising the traffic in
any network, a flow of data over the network as well as malicious threats that are trying to breach the network.
This technological solution also helps in triage the events detected by Network Traffic Analysing tools.
Page 11 of 12
5 unit Basics Of Ethical Hacking MCQS
39. How many basic processes or steps are there in ethical hacking?
a)4
b)5
c)6
d)7
Answer: c
Explanation: According to the standard ethical hacking standards, the entire process of hacking can be divided
into 6 steps or phases. These are: Reconnaissance, Scanning, Gaining Access, Maintaining Access, Tracks
clearing, reporting.
40. is the information gathering phase in ethical hacking from the target user.
a)Reconnaissance
b)Scanning
c)Gaining access
d)Maintaining access
Answer: a
Explanation: Reconnaissance is the phase where the ethical hacker tries to gather different kinds of information
aboutthetargetuser or the victim‟s system.
41. Which of the following is not a reconnaissance tool or technique for information gathering?
a)Hping
b)NMAP
c)Google Dorks
d)Nexpose
Answer: d
Explanation: Hping, NMAP & Google Dorks are tools and techniques for reconnaissance. Nexpose is a tool for
scanning the network for vulnerabilities.
Page 12 of 12
5 unit Basics Of Ethical Hacking MCQS
47. Which of the following comes after scanning phase in ethical hacking?
a)Scanning
b)Maintaining access
c)Reconnaissance
d)Gaining access
Answer: d
Explanation: Gaining access is the next step after scanning. Once the scanning tools are used to look for flaws
in a system, it is the next phase where the ethical hackers or penetration testers have to technically gain access
to a network or system.
Page 13 of 12
5 unit Basics Of Ethical Hacking MCQS
Page 14 of 12
5 unit Basics Of Ethical Hacking MCQS
Page 15 of 12