Ethical-Hacking Question Paper
Ethical-Hacking Question Paper
Question Bank
Class: T.Y.B. Sc.CS Semester: VI
Subject: Ethical Hacking
UNIT I
3. -------------------has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
7. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
11. _______ is the oldest phone hacking techniques used by hackers to make free calls
a) Phishing
b) Spamming
c) Phreaking
d) Cracking
12.Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hacktivism
13. Governments hired some highly skilled hackers. These types of hackers are termed as
_______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers
14.The security, functionality, and ease of use triangle illustrates which concept?
17. ------------ Testing involves performing a security evaluation and testing with no previous
knowledge of the network infrastructure or system to be tested
a) Black-box
b) White-box
c) Gray-box
d) Green-box
18. ---------- is a small piece of malicious program that runs hidden on an infected system.
a) Virus
b) Trojan
c) Shareware
d) Worm
19. ---------- of information means only authorized users are capable of accessing the
information.
a) Confidentiality
b) Integrity
c) Non-repudiation
d) Availability
21.When you use the word --------- it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
23.Integrity assuring____
a) Trust
b) Completeness
c) Accuracy of data
d) All of the above
a) True
b) False
30.What is a rootkit?
a) A simple tool to gain access to the root of the Windows system
b) A Trojan that sends information to an SMB relay
c) An invasive program that affects the system files, including the kernel and libraries
d) A tool to perform a buffer overflow
34.What is a zombie?
a) A compromised system used to launch a DDoS attack
b) The hacker’s computer
c) The victim of a DDoS attack
d) A compromised system that is the target of a DDoS attack
38.Which of the following is not the key term of the CIA triad?
a) Exploits
b) Availability
c) Confidentiality
d) Integrity
39. ______ to access information and other computing series begins with administrative
policies and procedures
a) Authentication
b) Verification
c) Authorization
d) Validation
41.The ________ Attack consist of exploitation of the web session control mechanism, which
is normally managed for a session token
a) Man-in-the middle
b) Session Hijacking
c) Waterhole
d) Cookie Theft
42. ---------- attack is a trial-and- error method used to obtain information such as User
Password.
a) Brute Force
b) DoS
c) Phishing
d) Clickjacking
43. ---------- is Sneaky program that tracks reports your computing activity without consent.
a) Rootkits
b) Virus
c) Trojan
d) Spyware
45. An --------- is any attempt or tries to expose, alter, disable, destroy, steal or gain
unauthorize access to or make unauthorized use of an asset
a) Attack
b) Asset
c) Alter
d) Attempt
47. Cross-site scripting (XSS) flaws give attacker the capability to inject -----------_____
scripts into the application
a) server-side
b) client-side
c) victim-side
d) attacker-side
49. A ----------- is a computer connected to the Internet that has been compromised by a
hacker
a) Botnets
b) zombie
c) malware
d) infected
50. The Rabbit virus makes multiple copies of itself on a single computer
a) Trojan
b) worm
c) Rabbit
d) Malware
Unit II
1. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
2. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
3. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
4. A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
a) privacy and security
b) rules and regulations
c) hacking techniques
d) ethics to talk to seniors
6. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
7. They are nefarious hackers, and their main motive is to gain financial profit by
doing cyber-crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
8. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
9. The amateur or newbie in the field of hacking who don’t have many skills about
coding and in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
a) who break a system for some specific purpose with or without keeping in mind
that they may suffer long term imprisonment due to their malicious activity
b) individuals with no knowledge of codes but an expert in using hacking tools
c) who know the consequences of their hacking activities and hence try to prevent
them by erasing their digital footprints
d) who are employed in an organization to do malicious activities on other firms
11. 43. Criminal minded individuals who work for terrorist organizations and steal
information of nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
13. Which type of hacker represents the highest risk to your network?
a) Black-hat hackers
b) Grey-hat hackers
c) Script kiddies
d) Disgruntled employees
18.What is footprinting?
a) Measuring the shoe size of an ethical hacker
b) Accumulation of data by gathering information on a target
c) Scanning a target network to detect operating system types
d) Mapping the physical layout of a target’s network
23. Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are ______
a) Black Hat hacker
b) External penetration tester
c) Blue Hat hacker
d) White Hat Hacker
24.A hacker needs to be a good programmer as many hacking software programs have ready-
made exploits that can be launched against a computer system or network. Identify the uses
of exploits.
(Choose which is not applicable.)
a)Initial attack
b)Expose vulnerability
c)Steal data
d)Gain privilege escalation
28. What type of testing is the best option for an organization that can benefit from the
experience of a security professional?
a) Automated testing tools
b) White-hat and black-hat testing
c) Manual testing
d) Automated testing
31. Which tool can be used to perform a DNS zone transfer on Windows?
a) nslookup
b) DNSlookup
c) whois
d) ipconfig
32. Which step comes after enumerating users in the CEH hacking cycle?
a) Crack password
b) Escalate privileges
c) Scanning
d) Covering tracks
33. What is the proper command to perform and NMAP SYN scan every 5 minutes?
a) nmap -ss - paranoid
b) nmap -Ss -paranoid
c) nmap -Ss -fast
d) namp -Ss -sneaky
34. A packet with all flags set is which type of scan?
a) Full Open
b) Syn scan
c) XMAS
d) TCP connect
38. Dumpster diving can be considered which type of social engineering attack?
a) Human-based
b) Computer-based
c) Physical access
d) Paper-based
39. Nslookup can be used to gather information regarding which of the following?
a) Host names and IP addresses
b) Whois information
c) DNS server locations
d) Name server types and operating systems
41. Faking a website for the purpose of getting a user’s password and username is which type
of social engineering attack?
a) Human-based
b) Computer-based
c) Web-based
d) User-based
42. What is it called when a hacker pretends to be a valid user on the system?
a) Impersonation
b) Third-person authorization
c) Help desk
d) Valid User
44. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
a) Remote attack
b) Physical access
c) Local Access
d) Internal Attack
46. If the information is leaked, the injured person can claim ____ of contract
a) end
b) suspension
c) violation
d) breach
48. ____is the process of exploiting weakness int the system and gaining unauthorized access
to data
a) Attack
b) Hijacking
c) Hacking
d) Threat
49. White hat hackers are also called as ethical hacker or ______
a) security
b) Kerberos
c) watchdog
d) pen testers
50. In ______ testing data domains and internal boundaries can be tested
a) Blue box
b) Glass box
c) Black box
d) White box
UNIT III
1. Which of them is not a disadvantage of active online attack?
a) Takes a long time
b) Easily and automatically detected
c) Need high network bandwidth
d) Need the patience to crack
3. In which year, hacking became a practical crime and a matter of concern in the field of
technology?
a) 1971
b) 1973
c) 1970
d) 1974
6. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
a) Local access
b) Remote attack
c) Internal attack
d) Physical access
12.What is cryptography?
a) The study of computer science
b) The study of mathematics
c) The study of encryption
d) The creation of encryption algorithms
13.Hackers and ethical hackers use the same tools and techniques.
a) True
b) False
14. _________flaws give attackers the capability to inject client-side scripts into applications.
16. ----------- hacking involves gaining access of the system as well as changing the integrity
of the system
a) system
b) black hat
c) grey hat
d) white hat
26. _____ framework is a collection of shellcodes, exploits, fuzzing tools, encoders, payloads
a) Simple
b) Complex
c) .Net
d) Metasploit
28. The process of gathering information about your target is known as_______
a) enumeration
b) Hacking
c) data gathering
d) hijacking
31. A __________ is a sequential segment of the memory location that is allocated for
containing some data such as a character string or an array of integers.
a) stack
b) queue
c) external storage
d) buffer
32. In a _____________ attack, the extra data that holds some specific instructions in the
memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
a) Phishing
b) MiTM
c) Buffer-overflow
d) Clickjacking
33. Let suppose a search box of an application can take at most 200 words, and you’ve
inserted more than that and pressed the search button; the system crashes. Usually this is
because of limited __________
a) buffer
b) external storage
c) processing power
d) local storage
34. The full form of Malware is ________
a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security
41. A Web site that allows users to enter text, such as a comment or a name, and then stores it
and later display it to other users, is potentially vulnerable to a kind of attack called a ----------
-------attack.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
42. ----------- is an attack which forces an end user to execute unwanted actions on a web
application in which he/she is currently authenticated.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
43. Many applications use ---------- where two independent factors are used to identify a user.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
47. QL injection is an attack in which --------- code is inserted into strings that are later
passed to an instance of SQL Server.
a) malicious
b) redundant
c) clean
d) non malicious
48. In ------------ attacks an attacker do not contact with authorizing party for stealing
password.
a) passive online
b) active online
c) offline
d) non-electronic