0% found this document useful (0 votes)
33 views17 pages

Topic-5 MCQ

The document consists of 100 multiple-choice questions (MCQs) focused on the basics of ethical hacking and cybersecurity. It covers various topics including the definitions of hackers, ethical hacking principles, types of attacks, and the ethical hacking process. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in the field.

Uploaded by

editor0511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views17 pages

Topic-5 MCQ

The document consists of 100 multiple-choice questions (MCQs) focused on the basics of ethical hacking and cybersecurity. It covers various topics including the definitions of hackers, ethical hacking principles, types of attacks, and the ethical hacking process. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in the field.

Uploaded by

editor0511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

TOPIC-5(Basics ofl lacking 100 MCQ )

1. Who is a hacker?

A) A software installer
B) A person who designs games
C) A person who accesses systems without authorization
D) A hardware engineer
Answer: C

2. Ethical hackers are also known as:

A) White hat hackers


B) Black hat hackers
C) Crackers
D) Virus creators
Answer: A

3. Why is it important to hack your own system?

A) For entertainment
B) To test vulnerabilities
C) To damage the system
D) To avoid updates
Answer: B

4. Which of these is a principle of ethical hacking?

A) Selling data
B) Crashing systems
C) Respecting privacy
D) Stealing passwords
Answer: C

5. Black hat hackers are known for:

A) Protecting systems
B) Ethical behavior
C) Malicious hacking
D) Writing antivirus software
Answer: C

6. Non-technical attacks include:

A) Social engineering
B) SQL injection
C) Buffer overflow
D) DoS attacks
Answer: A

7. Which one is NOT a danger to systems?


A) Application attacks
B) OS attacks
C) Network attacks
D) Software updates
Answer: D

8. What is the first step in the ethical hacking process?

A) Buying tools
B) Executing the plan
C) Formulating your plan
D) Evaluating results
Answer: C

9. Operating system attacks include:

A) Phishing
B) Weak password exploitation
C) Network scanning
D) Cookie theft
Answer: B

10. What is one main goal of ethical hacking?

A) Damaging systems
B) Identifying vulnerabilities
C) Stealing data
D) Avoiding updates
Answer: B

11. The hacker's mindset involves:

A) Following laws
B) Thinking defensively
C) Understanding system flaws
D) Ignoring security
Answer: C

12. Ethical hacking tools must be selected based on:

A) Price
B) UI design
C) Hacking goals
D) Software brand
Answer: C

13. The process of maintaining anonymity is important to:

A) Avoid recognition
B) Protect the hacker
C) Stay hidden during an attack
D) All of the above
Answer: D

14. Which of these is a danger in networks?

A) Port scanning
B) Patching systems
C) Login logs
D) Backup files
Answer: A

15. Who coined the term "ethical hacking"?

A) IBM
B) Apple
C) Google
D) Microsoft
Answer: A

16. What separates ethical hackers from malicious hackers?

A) Use of tools
B) Knowledge level
C) Intention and permission
D) Type of systems used
Answer: C

17. What is NOT a part of the ethical hacking process?

A) Evaluating results
B) Crashing systems
C) Formulating plan
D) Executing plan
Answer: B

18. What does "planning and performing attacks" refer to in ethical hacking?

A) Testing system defense


B) Damaging networks
C) Virus creation
D) Installing spyware
Answer: A

19. Who are malicious users?

A) Hackers who help companies


B) Government agents
C) Unauthorized system breakers
D) Hardware repairers
Answer: C

20. Which type of attack manipulates human behavior?

A) DoS
B) Spoofing
C) Social engineering
D) ARP poisoning
Answer: C

21. Which of these is an ethical hacking principle?

A) Working secretly
B) Working ethically
C) Denying responsibility
D) Using malware
Answer: B

22. Crashing your own system during testing is considered:

A) Ethical
B) Illegal
C) Unethical
D) Required
Answer: C

23. Hackers who break into systems for personal gain are called:

A) Grey hats
B) White hats
C) Red hats
D) Black hats
Answer: D

24. The final step in the ethical hacking process is:

A) Executing plan
B) Selecting tools
C) Evaluating results
D) Reporting bugs
Answer: C

25. Application-level attacks target:

A) RAM
B) Databases and software
C) BIOS
D) Printers
Answer: B
26. Ethical hackers must get ______ before testing.

A) Rewards
B) A password
C) Legal permission
D) A VPN
Answer: C

27. A hacker mindset requires:

A) Creative problem-solving
B) Hardware skills only
C) Focus on profit
D) System formatting
Answer: A

28. Network-infrastructure attacks affect:

A) Browsers
B) Power cables
C) Routers and switches
D) Mobile screens
Answer: C

29. Respecting privacy during hacking means:

A) Reading private chats


B) Avoiding sensitive data
C) Changing passwords
D) Editing logs
Answer: B

30. One reason hackers break into systems is to:

A) Secure the data


B) Understand policies
C) Gain unauthorized access
D) Reboot devices
Answer: C

31. What is reconnaissance in ethical hacking?

A) Data deletion
B) System crash
C) Information gathering
D) Sending spam
Answer: C

32. An ethical hacker's job includes:


A) Attacking competitors
B) Fixing bugs
C) Finding and reporting security issues
D) Making viruses
Answer: C

33. Cracking passwords is a part of:

A) Application testing
B) Network design
C) Ethical hacking (with permission)
D) Bypassing ethical process
Answer: C

34. What helps hackers remain anonymous?

A) VPN
B) Password
C) Router
D) Firewall
Answer: A

35. Which attack uses software flaws in systems?

A) OS-level attack
B) Social attack
C) Hardware attack
D) Visual attack
Answer: A

36. Who are grey hat hackers?

A) Hackers who follow rules


B) Hackers who report bugs without permission
C) Script kiddies
D) Data analysts
Answer: B

37. What is ethical hacking also called?

A) Network spying
B) Legal hacking
C) Bug hunting
D) None of the above
Answer: B

38. The ethical hacking process must be:

A) Fast
B) Secretive
C) Documented
D) Untraceable
Answer: C

39. Tools used in ethical hacking must be:

A) Expensive
B) Legal and appropriate
C) Hidden from authorities
D) Paid only
Answer: B

40. What is the result of not following ethical hacking principles?

A) Appreciation
B) Legal action
C) Promotions
D) Faster testing
Answer: B

41. What is a primary reason for OS-level attacks?

A) Missing keyboard
B) Flawed updates or patches
C) Power failure
D) Overheating
Answer: B

42. Hackers who defend networks are called:

A) White hats
B) Grey hats
C) Blue hats
D) Red hats
Answer: A

43. Which term defines “thinking like an attacker to improve security”?

A) Red teaming
B) Security audit
C) Ethical hacking
D) Reverse engineering
Answer: C

44. Network sniffing is used to:

A) Analyze network traffic


B) Generate power
C) Stop users
D) Crash a server
Answer: A

45. What must be avoided during ethical hacking?

A) Reporting bugs
B) Crashing systems
C) Using firewalls
D) Creating reports
Answer: B

46. Maintaining anonymity helps in:

A) Marketing
B) Ethical certification
C) Realistic simulation
D) Invoicing
Answer: C

47. Hackers are often classified by:

A) Country
B) Color hats
C) Hobbies
D) Passwords
Answer: B

48. What is the ethical hacker’s primary motivation?

A) Fame
B) Curiosity
C) Helping organizations
D) Cracking software
Answer: C

49. A hacker that uses skills for social good is called a:

A) Cracker
B) Black hat
C) White hat
D) Trojan
Answer: C

50. Which of the following helps evaluate the success of ethical hacking?

A) Hardware speed
B) Evaluation report
C) IP address
D) GUI interface
Answer: B
51. What is one of the primary goals of malicious hackers?

A) System hardening
B) Data protection
C) Data theft or disruption
D) Firewall configuration
Answer: C

52. The first step in ethical hacking is to:

A) Start the attack


B) Select tools randomly
C) Formulate a legal plan
D) Report findings
Answer: C

53. What does reconnaissance mean in the hacking process?

A) Cleaning logs
B) Scanning barcodes
C) Gathering preliminary information
D) Sending phishing links
Answer: C

54. Which attack targets the underlying infrastructure of a network?

A) Application attack
B) Network-infrastructure attack
C) Social engineering
D) Phishing
Answer: B

55. Operating System attacks exploit:

A) Power supply
B) OS vulnerabilities
C) Mouse settings
D) Printer drivers
Answer: B

56. What does "black hat" hacker stand for?

A) Security analyst
B) Malicious hacker
C) Hardware engineer
D) Ethical hacker
Answer: B

57. What is the last step in ethical hacking?


A) Installing backdoors
B) Executing the plan
C) Evaluating results and reporting
D) Ignoring the logs
Answer: C

58. Which method helps hackers avoid detection?

A) Antivirus
B) Encryption
C) Maintaining anonymity
D) Auto-login
Answer: C

59. An example of a non-technical attack is:

A) Session hijacking
B) Physical damage
C) Social engineering
D) Trojan horse
Answer: C

60. Hackers become ethical hackers by:

A) Stealing credentials
B) Working for security teams
C) Bypassing authentication
D) Crashing systems
Answer: B

61. “Cracking the hacker mindset” helps us to:

A) Build malware
B) Understand their strategy
C) Hide vulnerabilities
D) Bypass tools
Answer: B

62. Who breaks into systems mainly for recognition and challenge?

A) Cybercriminals
B) White hats
C) Hacktivists
D) Script kiddies
Answer: D

63. What is phishing classified as?

A) OS attack
B) Application attack
C) Network attack
D) Non-technical attack
Answer: D

64. Which type of hacker tests systems with permission?

A) Black hat
B) Grey hat
C) White hat
D) Red hat
Answer: C

65. The principle “not crashing your system” ensures:

A) Internet access
B) Safe ethical hacking
C) Firewall bypassing
D) Password resetting
Answer: B

66. A hacker exploiting a zero-day vulnerability is targeting:

A) Known bugs
B) Recently patched flaws
C) Unknown or unpatched bugs
D) UI designs
Answer: C

67. Which attack method involves sending fake emails?

A) SQL injection
B) Phishing
C) Sniffing
D) Port scanning
Answer: B

68. What does a grey hat hacker do?

A) Hacks illegally for fun


B) Hacks with legal permission
C) Hacks without permission but reports vulnerabilities
D) Works in red teams
Answer: C

69. One ethical hacking principle is:

A) Publicizing vulnerabilities
B) Working without authorization
C) Working ethically
D) Disabling antivirus
Answer: C

70. What helps hackers stay untraceable?

A) Direct login
B) Anonymity tools
C) Password hints
D) Admin rights
Answer: B

71. What is a major application-level attack?

A) MITM
B) Keylogging
C) SQL injection
D) IP spoofing
Answer: C

72. One risk of unethical hacking is:

A) Bug fixing
B) Jail time or fines
C) Extra credits
D) Network speed increase
Answer: B

73. An attack that overwhelms a system’s resources is:

A) DoS
B) Keylogging
C) MAC spoofing
D) SQL injection
Answer: A

74. Buffer overflow is categorized under:

A) Network attacks
B) Social engineering
C) OS attacks
D) DNS spoofing
Answer: C

75. One purpose of hacking your own system is to:

A) Damage it
B) Share passwords
C) Find and fix weaknesses
D) Format the drive
Answer: C
76. Hackers often use what to bypass firewalls?

A) Antivirus
B) Remote desktop
C) Tunneling
D) Cookies
Answer: C

77. Which hacking method involves modifying software code?

A) Cracking
B) Phishing
C) Snooping
D) Tailgating
Answer: A

78. What’s the focus of ethical hacking evaluations?

A) Graphic performance
B) Network speed
C) Identified vulnerabilities
D) Color themes
Answer: C

79. A hacker hiding IP address is using:

A) Proxy or VPN
B) Antivirus
C) Firewall
D) Password manager
Answer: A

80. What does “exploit” mean in cybersecurity?

A) Secure software
B) Bug fixing
C) Code or method to use a vulnerability
D) Database optimization
Answer: C

81. An example of specialized attack includes targeting:

A) Google
B) Facebook
C) SCADA or industrial systems
D) YouTube
Answer: C

82. Which team simulates attacks in organizations?


A) Blue team
B) White team
C) Red team
D) Green team
Answer: C

83. A hacker focused on system security enhancement is:

A) White hat
B) Black hat
C) Cracker
D) Malware writer
Answer: A

84. Which of these should ethical hackers always do?

A) Crash the system


B) Work without a plan
C) Obtain proper authorization
D) Bypass security without notice
Answer: C

85. Which attack sends repeated requests to crash a server?

A) Sniffing
B) DDoS
C) ARP spoofing
D) Session hijack
Answer: B

86. Defacing a website homepage is a:

A) Legal test
B) Hacking challenge
C) Malicious activity
D) Network upgrade
Answer: C

87. Which phase involves choosing appropriate hacking tools?

A) Reporting
B) Planning
C) Tool selection
D) Evaluation
Answer: C

88. Using malware to attack systems falls under:

A) Ethical hacking
B) OS attacks
C) Non-technical attacks
D) Planning
Answer: B

89. What is a key goal of ethical hacking?

A) Profit
B) Data deletion
C) Cybersecurity improvement
D) Password cracking
Answer: C

90. A hacker attempting to bypass login without permission is:

A) Ethical hacker
B) Auditor
C) Malicious hacker
D) Consultant
Answer: C

91. Using Tor browser can help in:

A) Playing games
B) Crashing systems
C) Maintaining anonymity
D) Making firewalls
Answer: C

92. When hackers install backdoors, they aim to:

A) Improve boot speed


B) Allow future unauthorized access
C) Block users
D) Activate antivirus
Answer: B

93. Reconnaissance is also called:

A) Cleanup
B) Enumeration
C) Information gathering
D) Deployment
Answer: C

94. Which ethical hacking phase comes just before tool selection?

A) Planning
B) Reporting
C) Execution
D) Research
Answer: A

95. An attacker tricking users via fake websites is using:

A) DNS hijacking
B) Firewall testing
C) Application debugging
D) Server-side scripting
Answer: A

96. Ethical hackers often work for:

A) Attack groups
B) Security companies
C) Virus developers
D) Hacktivist groups
Answer: B

97. A white hat hacker reports flaws to:

A) Hackers
B) Public blogs
C) Competitors
D) System owners
Answer: D

98. The process of validating tools and techniques is part of:

A) System reset
B) Tool update
C) Evaluation
D) Tool download
Answer: C

99. Installing keyloggers is part of:

A) User feedback
B) Malware deployment
C) OS updates
D) Password reset
Answer: B

100. Which of the following is a core ethical principle?

A) Data deletion
B) Disabling accounts
C) Respecting privacy
D) Modifying settings
Answer: C

You might also like