0% found this document useful (0 votes)
681 views22 pages

Ethical-Hacking Question Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
681 views22 pages

Ethical-Hacking Question Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

PUNE VIDYARTHI GRIHA’S

COLLEGE OF SCIENCE AND TECHNOLOGY


Affiliated to University of Mumbai

Question Bank
Class: T.Y.B. Sc.CS Semester: VI
Subject: Ethical Hacking

UNIT I

1. What is the ethics behind training how to hack a system?


a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware

2. Performing a shoulder surfing in order to check other’s password is ____________


ethical practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad

3. -------------------has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms

4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False

5. --------------- is the technique used in business organizations and firms to protect IT


assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
6. The legal risks of ethical hacking include lawsuits due to ------------ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking

7. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False

8. ------------ helps to classify arguments and situations, better understand a cyber-crime


and helps to determine appropriate actions.
a) Cyber-ethics
b) Social ethics
c) Cyber-bullying
d) Corporate behaviour

9. In which year the first popular hacker conference took place?


a) 1994
b) 1995
c) 1993
d) 1992

10. What is the name of the first hacker’s conference?


a) DEFCON
b) OSCON
c) DEVCON
d) SECCON

11. _______ is the oldest phone hacking techniques used by hackers to make free calls
a) Phishing
b) Spamming
c) Phreaking
d) Cracking

12.Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hacktivism

13. Governments hired some highly skilled hackers. These types of hackers are termed as
_______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers
14.The security, functionality, and ease of use triangle illustrates which concept?

a) As security increases, functionality and ease of use increase.


b) As security decreases, functionality and ease of use increase.
c) As security decreases, functionality and ease of use decrease.
d) Security does not affect functionality ease of use.

15. _----------- are programs to execute a series of operation automatically


a) bots
b) robots
c) machine
d) helper

16. What is the first step in a SQL injection attack?


a) Enter arbitrary commands at a user prompt
b) Locate a user field on a web page
c) Locate the return pointer
d) Enter a series of NOPs

17. ------------ Testing involves performing a security evaluation and testing with no previous
knowledge of the network infrastructure or system to be tested
a) Black-box
b) White-box
c) Gray-box
d) Green-box

18. ---------- is a small piece of malicious program that runs hidden on an infected system.
a) Virus
b) Trojan
c) Shareware
d) Worm

19. ---------- of information means only authorized users are capable of accessing the
information.
a) Confidentiality
b) Integrity
c) Non-repudiation
d) Availability

20. What does availability of data mean?


a) Assurance that data exists.
b) Assurance that data will be restricted and available to authorize People.
c) Assurance that data will be accurate and trustworthy.
d) The level of assurance that data will be available to people who need it, when they
need it

21.When you use the word --------- it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability

22.What does the CIA stand for?


a) Confidentiality, Integrity, Availability
b) Central Intelligence Agency
c) Cybersecurity Investigation Agency
d) Cybersecurity, Internet, Accessibility

23.Integrity assuring____
a) Trust
b) Completeness
c) Accuracy of data
d) All of the above

24.Which of this is an example of physical hacking?


a) Remote Unauthorised access
b) Inserting malware loaded USB to a system
c) SQL Injection on SQL vulnerable site
d) DDoS (Distributed Denial of Service) attack

25. ---------- is a weakness that can be exploited by attackers.


a) System with Virus
b) System without firewall
c) System with vulnerabilities
d) System with a strong password

26.Hacking for a cause is called ..................


a) Hacktivism
b) Black-hat hacking
c) Active hacking
d) Activism

27.BOTs are computer program or software applications design to execute a series of


operations automatically

a) True
b) False

28. ---------- means verifying a claim of identity


a) availability
b) authorization
c) identification
d) Authentication

29. How does a Denial of Service attack work?


a) Cracks passwords, causing the system to crash
b) Imitates a valid user
c) Prevents a legitimate user from using a system or service
d) Attempts to break the authentication method

30.What is a rootkit?
a) A simple tool to gain access to the root of the Windows system
b) A Trojan that sends information to an SMB relay
c) An invasive program that affects the system files, including the kernel and libraries
d) A tool to perform a buffer overflow

31.----------- is the recommended password-change interval?


a) 30 days
b) 20 days
c) 1 day
d) 7 days

32.What is the difference between a backdoor and a Trojan?


a) A Trojan usually provides a backdoor for a hacker.
b) A backdoor must be installed first.
c) A Trojan is not a way to access a system.
d) A backdoor is provided only through a virus, not through a Trojan.

33.How do you remove a Trojan from a system?


a) Search the Internet for freeware removal tools.
b) Purchase commercially available tools to remove the Trojan.
c) Reboot the system.
d) Uninstall and reinstall all applications.

34.What is a zombie?
a) A compromised system used to launch a DDoS attack
b) The hacker’s computer
c) The victim of a DDoS attack
d) A compromised system that is the target of a DDoS attack

35.What is the objective of ethical hacking from the hacker’s perspective?


a) Determine the security posture of the organization.
b) B. Find and penetrate invalid parameters.
c) Find and steal available system resources.
d) Leave marks on the network to prove they gained access.

36.This term is not used in hacking circles.


a) Vulnerabilities
b) Exploits
c) Integrity
d) Zero-day attack
37.Ethical hacking cannot:
a) Perform security analysis
b) Prioritize threats
c) Test resources
d) Exploit vulnerabilities

38.Which of the following is not the key term of the CIA triad?
a) Exploits
b) Availability
c) Confidentiality
d) Integrity

39. ______ to access information and other computing series begins with administrative
policies and procedures
a) Authentication
b) Verification
c) Authorization
d) Validation

40. Choose the one that doesn’t belong.


A. Zero-day attacks
B. Natural threat
C. Exploits
D. Malware

41.The ________ Attack consist of exploitation of the web session control mechanism, which
is normally managed for a session token
a) Man-in-the middle
b) Session Hijacking
c) Waterhole

d) Cookie Theft

42. ---------- attack is a trial-and- error method used to obtain information such as User
Password.

a) Brute Force
b) DoS
c) Phishing
d) Clickjacking
43. ---------- is Sneaky program that tracks reports your computing activity without consent.

a) Rootkits
b) Virus
c) Trojan
d) Spyware

44. _____ is a weakness which can be exploited by a Threat


a) Weakness
b) Vulnerability
c) Virus
d) Threat

45. An --------- is any attempt or tries to expose, alter, disable, destroy, steal or gain
unauthorize access to or make unauthorized use of an asset
a) Attack
b) Asset
c) Alter
d) Attempt

46. The Open Web Application Security Project (OWASP) is a --------------organisation


a) commercial
b) non-profit
c) free
d) banking

47. Cross-site scripting (XSS) flaws give attacker the capability to inject -----------_____
scripts into the application
a) server-side
b) client-side
c) victim-side
d) attacker-side

48. ________ is a cyber-attack that uses disguised email as a weapon


a) Backtrack
b) Phishing
c) DOS
d) brute force

49. A ----------- is a computer connected to the Internet that has been compromised by a
hacker
a) Botnets
b) zombie
c) malware
d) infected

50. The Rabbit virus makes multiple copies of itself on a single computer
a) Trojan
b) worm
c) Rabbit
d) Malware

Unit II

1. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm

2. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting

3. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking

4. A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
a) privacy and security
b) rules and regulations
c) hacking techniques
d) ethics to talk to seniors

5. What is the preferred communications method used with systems on a bot-net?


a) IRC
b) E-mail
c) ICMP
d) TFTP

6. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers

7. They are nefarious hackers, and their main motive is to gain financial profit by
doing cyber-crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers

8. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers

9. The amateur or newbie in the field of hacking who don’t have many skills about
coding and in-depth working of security and hacking tools are called ________

a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers

10. Suicide Hackers are those _________

a) who break a system for some specific purpose with or without keeping in mind
that they may suffer long term imprisonment due to their malicious activity
b) individuals with no knowledge of codes but an expert in using hacking tools
c) who know the consequences of their hacking activities and hence try to prevent
them by erasing their digital footprints
d) who are employed in an organization to do malicious activities on other firms

11. 43. Criminal minded individuals who work for terrorist organizations and steal
information of nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers

12. What is the next step to be performed after footprinting?


a) Enumeration
b) scanning
c) System hacking
d) Active information gathering

13. Which type of hacker represents the highest risk to your network?
a) Black-hat hackers
b) Grey-hat hackers
c) Script kiddies
d) Disgruntled employees

14. Which of the following tool/s is/are used for footprinting?


a) Whois
b) Sam Spade
c) SuperScan
d) NCC

15. Which of the following statements best describes a white-hat hacker?


a) Security professional
b) Former black hat
c) Former grey hat
d) Malicious hacker

16. Which of the following is a tool for performing footprinting undetected?


a) Whois search
b) Traceroute
c) Ping sweep
d) Host scanning
17. What is the next step to be performed after footprinting?
a) Scanning
b) Enumeration
c) System hacking
d) Active information gathering

18.What is footprinting?
a) Measuring the shoe size of an ethical hacker
b) Accumulation of data by gathering information on a target
c) Scanning a target network to detect operating system types
d) Mapping the physical layout of a target’s network

19.Why would hackers want to cover their tracks?


a) To prevent another person from using the programs they have installed on a target
system
b) To prevent detection or discovery
c) To prevent hacking attempts
d) To keep other hackers from using their tools
20. How do you remove a Trojan from a system?
a) Search the Internet for freeware removal tools.
b) Purchase commercially available tools to remove the Trojan.
c) Reboot the system.
d) Uninstall and reinstall all applications.
21.What is sniffing?
a) Sending corrupted data on the network to trick a system
b) Capturing and deciphering traffic on a network
c) Corrupting the ARP cache on a target system
d) Performing a password-cracking attack

22. What is the first step of a pen test?


a) Create a map of the network by scanning.
b) Locate the remote access connections to the network.
c) Sign a scope of work, NDA, and liability release document with the client.
d) Perform a physical security audit to ensure the physical site is secure.

23. Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are ______
a) Black Hat hacker
b) External penetration tester
c) Blue Hat hacker
d) White Hat Hacker

24.A hacker needs to be a good programmer as many hacking software programs have ready-
made exploits that can be launched against a computer system or network. Identify the uses
of exploits.
(Choose which is not applicable.)
a)Initial attack
b)Expose vulnerability
c)Steal data
d)Gain privilege escalation

25.From discovery until disclosure, it is a:


a) Black risk
b) White risk
c) Gray risk
d) Red risk

26.Who are self-proclaimed ethical hackers?


a) Black hat hackers
b) White hat hackers
c) Gray hat hackers
d) Red hat hackers
27.Pen testers will use _____ to protect the possibility of data leakage and add another layer
of security.
a) code review
b)vulnerability scan
c) manual testing
d) planning

28. What type of testing is the best option for an organization that can benefit from the
experience of a security professional?
a) Automated testing tools
b) White-hat and black-hat testing
c) Manual testing
d) Automated testing

29. What is the purpose of a pen test?


a) To simulate methods that intruders take to gain escalated privileges
b) To see if you can get confidential network data
c) To test the security posture and policies and procedures of an organization
d) To get passwords

30. What is enumeration?


a) Identifying active systems on the network
b) Cracking passwords
c) Identifying users and machine names
d) Identifying routers and firewalls

31. Which tool can be used to perform a DNS zone transfer on Windows?
a) nslookup
b) DNSlookup
c) whois
d) ipconfig

32. Which step comes after enumerating users in the CEH hacking cycle?
a) Crack password
b) Escalate privileges
c) Scanning
d) Covering tracks

33. What is the proper command to perform and NMAP SYN scan every 5 minutes?
a) nmap -ss - paranoid
b) nmap -Ss -paranoid
c) nmap -Ss -fast
d) namp -Ss -sneaky
34. A packet with all flags set is which type of scan?
a) Full Open
b) Syn scan
c) XMAS
d) TCP connect

35. What are the three types of scanning?


a) Port, network, and vulnerability
b) Port, network, and services
c) Grey, black, and white hat
d) Server, client, and network

36. Banner grabbing is an example of what?


a) Passive operating system fingerprinting
b) Active operating system fingerprinting
c) Footprinting
d) Application analysis

37. What is war dialing used for?


a) Testing firewall security
b) Testing remote access system security
c) Configuring a proxy filtering gateway
d) Configuring a firewall

38. Dumpster diving can be considered which type of social engineering attack?
a) Human-based
b) Computer-based
c) Physical access
d) Paper-based

39. Nslookup can be used to gather information regarding which of the following?
a) Host names and IP addresses
b) Whois information
c) DNS server locations
d) Name server types and operating systems

40. What is footprinting?


a) Measuring the shoe size of an ethical hacker
b) Accumulation of data by gathering information on a target
c) Scanning a target network to detect operating system types
d) Mapping the physical layout of a target’s network

41. Faking a website for the purpose of getting a user’s password and username is which type
of social engineering attack?
a) Human-based
b) Computer-based
c) Web-based
d) User-based

42. What is it called when a hacker pretends to be a valid user on the system?
a) Impersonation
b) Third-person authorization
c) Help desk
d) Valid User

43. What is the best reason to implement a security policy?


a) It increases security.
b) It makes security harder to enforce
c) It removes the employee’s responsibility to make judgments
d) It decreases security

44. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
a) Remote attack
b) Physical access
c) Local Access
d) Internal Attack

45. In_______testing extensive implementation knowledge is required


a) Black box
b) White box
c) Blue box
d) Grey box

46. If the information is leaked, the injured person can claim ____ of contract
a) end
b) suspension
c) violation
d) breach

47. NDA stands for ______


a) National Defence Academy
b) Non-disclosure agreement
c) Non-developed asset
d) national digital agency

48. ____is the process of exploiting weakness int the system and gaining unauthorized access
to data
a) Attack
b) Hijacking
c) Hacking
d) Threat

49. White hat hackers are also called as ethical hacker or ______
a) security
b) Kerberos
c) watchdog
d) pen testers

50. In ______ testing data domains and internal boundaries can be tested
a) Blue box
b) Glass box
c) Black box
d) White box
UNIT III
1. Which of them is not a disadvantage of active online attack?
a) Takes a long time
b) Easily and automatically detected
c) Need high network bandwidth
d) Need the patience to crack

2. In which year, first practical technology hacking came into origin?


a) 1878
b) 1890
c) 1895
d) 1876

3. In which year, hacking became a practical crime and a matter of concern in the field of
technology?
a) 1971
b) 1973
c) 1970
d) 1974

4. Which one of the following is not a part of Metasploit interface?


a) msfgui
b) msfconsole
c) msfcli
d) msfpayload

5. Ehtical hacking is the process of finding the vulnerabilities in a system


through____procedures.
a)Unlafuk
b)Legal
c)Illegal
d)Screte

6. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
a) Local access
b) Remote attack
c) Internal attack
d) Physical access

7. What is the first phase of hacking?


a) Maintaining access
b) Gaining access
c) Reconnaissance
d) Scanning

8. In which attack attacker changes the MAC address


a) DNS poisoning
b) Buffer overflow
c) IOT attack
d) ARP poisoning

9. What is the best way to prevent a social-engineering attack?


a) Installing a firewall to prevent port scans
b) Configuring an IDS to detect intrusion attempts
c) Increasing the number of help-desk personnel
d) Employee training and education

10.________ is the process of hiding text within an image called?


a) Steganography
b) Encryption
c) Spyware
d) Keystroke logging

11.What is necessary in order to install a hardware keylogger on a target system?


a) The IP address of the system
b) The Administrator username and password
c) Physical access to the system
d) Telnet access to the system

12.What is cryptography?
a) The study of computer science
b) The study of mathematics
c) The study of encryption
d) The creation of encryption algorithms

13.Hackers and ethical hackers use the same tools and techniques.
a) True
b) False

14. _________flaws give attackers the capability to inject client-side scripts into applications.

a) Cross Site Scripting (XSS)


b) SQL Injection (SQLI)
c) IDS/IPS
d) SMTP
15._________ is decoy computer system for trapping hackers or tracking unconventional or
new hacking methods.
a) Encryption
b) Denial of Service
c) Spoofing
d) Honeypot

16. ----------- hacking involves gaining access of the system as well as changing the integrity
of the system
a) system
b) black hat
c) grey hat
d) white hat

17. A_____ can refer to any good computer programmer


a) security
b) developer
c) hacker
d) tester

18. Linux is ___ operating system


a) open source
b) expensive
c) difficult
d) automated

19. Windows is ___ operating system


a) open source
b) expensive
c) difficult
d) automated

20. ____ kernel is used in Windows


a) Monolithic kernel
b) Micro kernel
c) simple kernel
d) complex kernel

21. ____ kernel is used in Linux


a) Monolithic kernel
b) Micro kernel
c) simple kernel
d) complex kernel
22. In Windows separation of the directories using ______
a) Back slash
b) Forward slash
c) dot
d) underscore

23. In Linux separation of the directories using ______


a) Back slash
b) Forward slash
c) dot
d) underscore

24. In _____ file naming is case sensitive


a) Solarise
b) Mac
c) Linux
d) Windows

25. In _____ file naming is case insensitive


a) Solarise
b) Mac
c) Linux
d) Windows

26. _____ framework is a collection of shellcodes, exploits, fuzzing tools, encoders, payloads
a) Simple
b) Complex
c) .Net
d) Metasploit

27. ____ Linux is based on a rolling release model


a) Red hat
b) Kali
c) Ubuntu
d) Dolphin

28. The process of gathering information about your target is known as_______
a) enumeration
b) Hacking
c) data gathering
d) hijacking

29. What is common port number of HTTP?


a) 40
b) 81
c) 80
d) 21

30. What is common port number of FTP?


a) 40
b) 80
c) 81
d) 21

31. A __________ is a sequential segment of the memory location that is allocated for
containing some data such as a character string or an array of integers.
a) stack
b) queue
c) external storage
d) buffer

32. In a _____________ attack, the extra data that holds some specific instructions in the
memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
a) Phishing
b) MiTM
c) Buffer-overflow
d) Clickjacking

33. Let suppose a search box of an application can take at most 200 words, and you’ve
inserted more than that and pressed the search button; the system crashes. Usually this is
because of limited __________
a) buffer
b) external storage
c) processing power
d) local storage
34. The full form of Malware is ________
a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security

35. Who deploy Malwares to a system or network?


a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists
b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists
c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists
d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers
36. When there is an excessive amount of data flow, which the system cannot handle, _____
attack takes place.
a) Database crash attack
b) DoS (Denial of Service) attack
c) Data overflow Attack
d) Buffer Overflow attack
37. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called ___________
a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
38. Which method of hacking will record all your keystrokes?
a) Keyhijacking
b) Keyjacking
c) Keylogging
d) Keyboard monitoring
39. _________ are the special type of programs used for recording and tracking user’s
keystroke.
a) Keylogger
b) Trojans
c) Virus
d) Worms
40. These are a collective term for malicious spying programs used for secretly monitoring
someone’s activity and actions over a digital medium.
a) Malware
b) Remote Access Trojans
c) Keyloggers
d) Spyware

41. A Web site that allows users to enter text, such as a comment or a name, and then stores it
and later display it to other users, is potentially vulnerable to a kind of attack called a ----------
-------attack.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting

42. ----------- is an attack which forces an end user to execute unwanted actions on a web
application in which he/she is currently authenticated.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting

43. Many applications use ---------- where two independent factors are used to identify a user.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting

44. Even with two-factor authentication, users may still be vulnerable


to_____________attacks.
a) Radiant
b) Cross attack
c) scripting
d) Man-in-the-middle

45. Point out the wrong statement.


a) SQL injection vulnerabilities occur whenever input is used in the construction of an SQL
query without being adequately constrained or sanitized
b) SQL injection allows an attacker to access the SQL servers and execute SQL code under
the privileges of the user used to connect to the database
c) The use of PL-SQL opens the door to these vulnerabilities
d) None of the mentioned

46. -------------- is time based SQL injection attack.


a) Quick detection
b) Initial Exploitation
c) Blind SQL Injection
d) Inline Comments

47. QL injection is an attack in which --------- code is inserted into strings that are later
passed to an instance of SQL Server.
a) malicious
b) redundant
c) clean
d) non malicious

48. In ------------ attacks an attacker do not contact with authorizing party for stealing
password.
a) passive online
b) active online
c) offline
d) non-electronic

49.Which of the following is an example of passive online attack?


a) Phishing
b) Social Engineering
c) Spamming
d) Wire sniffing

50. Which of the following is not an example of a passive online attack?


a) MiTM
b) Reply Attack
c) Phishing
d) Wire sniffing

You might also like