Topic-5 MCQ
Topic-5 MCQ
1. Who is a hacker?
A) A software installer
B) A person who designs games
C) A person who accesses systems without authorization
D) A hardware engineer
Answer: C
A) For entertainment
B) To test vulnerabilities
C) To damage the system
D) To avoid updates
Answer: B
A) Selling data
B) Crashing systems
C) Respecting privacy
D) Stealing passwords
Answer: C
A) Protecting systems
B) Ethical behavior
C) Malicious hacking
D) Writing antivirus software
Answer: C
A) Social engineering
B) SQL injection
C) Buffer overflow
D) DoS attacks
Answer: A
A) Buying tools
B) Executing the plan
C) Formulating your plan
D) Evaluating results
Answer: C
A) Phishing
B) Weak password exploitation
C) Network scanning
D) Cookie theft
Answer: B
A) Damaging systems
B) Identifying vulnerabilities
C) Stealing data
D) Avoiding updates
Answer: B
A) Following laws
B) Thinking defensively
C) Understanding system flaws
D) Ignoring security
Answer: C
A) Price
B) UI design
C) Hacking goals
D) Software brand
Answer: C
A) Avoid recognition
B) Protect the hacker
C) Stay hidden during an attack
D) All of the above
Answer: D
A) Port scanning
B) Patching systems
C) Login logs
D) Backup files
Answer: A
A) IBM
B) Apple
C) Google
D) Microsoft
Answer: A
A) Use of tools
B) Knowledge level
C) Intention and permission
D) Type of systems used
Answer: C
A) Evaluating results
B) Crashing systems
C) Formulating plan
D) Executing plan
Answer: B
18. What does "planning and performing attacks" refer to in ethical hacking?
A) DoS
B) Spoofing
C) Social engineering
D) ARP poisoning
Answer: C
A) Working secretly
B) Working ethically
C) Denying responsibility
D) Using malware
Answer: B
A) Ethical
B) Illegal
C) Unethical
D) Required
Answer: C
23. Hackers who break into systems for personal gain are called:
A) Grey hats
B) White hats
C) Red hats
D) Black hats
Answer: D
A) Executing plan
B) Selecting tools
C) Evaluating results
D) Reporting bugs
Answer: C
A) RAM
B) Databases and software
C) BIOS
D) Printers
Answer: B
26. Ethical hackers must get ______ before testing.
A) Rewards
B) A password
C) Legal permission
D) A VPN
Answer: C
A) Creative problem-solving
B) Hardware skills only
C) Focus on profit
D) System formatting
Answer: A
A) Browsers
B) Power cables
C) Routers and switches
D) Mobile screens
Answer: C
A) Data deletion
B) System crash
C) Information gathering
D) Sending spam
Answer: C
A) Application testing
B) Network design
C) Ethical hacking (with permission)
D) Bypassing ethical process
Answer: C
A) VPN
B) Password
C) Router
D) Firewall
Answer: A
A) OS-level attack
B) Social attack
C) Hardware attack
D) Visual attack
Answer: A
A) Network spying
B) Legal hacking
C) Bug hunting
D) None of the above
Answer: B
A) Fast
B) Secretive
C) Documented
D) Untraceable
Answer: C
A) Expensive
B) Legal and appropriate
C) Hidden from authorities
D) Paid only
Answer: B
A) Appreciation
B) Legal action
C) Promotions
D) Faster testing
Answer: B
A) Missing keyboard
B) Flawed updates or patches
C) Power failure
D) Overheating
Answer: B
A) White hats
B) Grey hats
C) Blue hats
D) Red hats
Answer: A
A) Red teaming
B) Security audit
C) Ethical hacking
D) Reverse engineering
Answer: C
A) Reporting bugs
B) Crashing systems
C) Using firewalls
D) Creating reports
Answer: B
A) Marketing
B) Ethical certification
C) Realistic simulation
D) Invoicing
Answer: C
A) Country
B) Color hats
C) Hobbies
D) Passwords
Answer: B
A) Fame
B) Curiosity
C) Helping organizations
D) Cracking software
Answer: C
A) Cracker
B) Black hat
C) White hat
D) Trojan
Answer: C
50. Which of the following helps evaluate the success of ethical hacking?
A) Hardware speed
B) Evaluation report
C) IP address
D) GUI interface
Answer: B
51. What is one of the primary goals of malicious hackers?
A) System hardening
B) Data protection
C) Data theft or disruption
D) Firewall configuration
Answer: C
A) Cleaning logs
B) Scanning barcodes
C) Gathering preliminary information
D) Sending phishing links
Answer: C
A) Application attack
B) Network-infrastructure attack
C) Social engineering
D) Phishing
Answer: B
A) Power supply
B) OS vulnerabilities
C) Mouse settings
D) Printer drivers
Answer: B
A) Security analyst
B) Malicious hacker
C) Hardware engineer
D) Ethical hacker
Answer: B
A) Antivirus
B) Encryption
C) Maintaining anonymity
D) Auto-login
Answer: C
A) Session hijacking
B) Physical damage
C) Social engineering
D) Trojan horse
Answer: C
A) Stealing credentials
B) Working for security teams
C) Bypassing authentication
D) Crashing systems
Answer: B
A) Build malware
B) Understand their strategy
C) Hide vulnerabilities
D) Bypass tools
Answer: B
62. Who breaks into systems mainly for recognition and challenge?
A) Cybercriminals
B) White hats
C) Hacktivists
D) Script kiddies
Answer: D
A) OS attack
B) Application attack
C) Network attack
D) Non-technical attack
Answer: D
A) Black hat
B) Grey hat
C) White hat
D) Red hat
Answer: C
A) Internet access
B) Safe ethical hacking
C) Firewall bypassing
D) Password resetting
Answer: B
A) Known bugs
B) Recently patched flaws
C) Unknown or unpatched bugs
D) UI designs
Answer: C
A) SQL injection
B) Phishing
C) Sniffing
D) Port scanning
Answer: B
A) Publicizing vulnerabilities
B) Working without authorization
C) Working ethically
D) Disabling antivirus
Answer: C
A) Direct login
B) Anonymity tools
C) Password hints
D) Admin rights
Answer: B
A) MITM
B) Keylogging
C) SQL injection
D) IP spoofing
Answer: C
A) Bug fixing
B) Jail time or fines
C) Extra credits
D) Network speed increase
Answer: B
A) DoS
B) Keylogging
C) MAC spoofing
D) SQL injection
Answer: A
A) Network attacks
B) Social engineering
C) OS attacks
D) DNS spoofing
Answer: C
A) Damage it
B) Share passwords
C) Find and fix weaknesses
D) Format the drive
Answer: C
76. Hackers often use what to bypass firewalls?
A) Antivirus
B) Remote desktop
C) Tunneling
D) Cookies
Answer: C
A) Cracking
B) Phishing
C) Snooping
D) Tailgating
Answer: A
A) Graphic performance
B) Network speed
C) Identified vulnerabilities
D) Color themes
Answer: C
A) Proxy or VPN
B) Antivirus
C) Firewall
D) Password manager
Answer: A
A) Secure software
B) Bug fixing
C) Code or method to use a vulnerability
D) Database optimization
Answer: C
A) Google
B) Facebook
C) SCADA or industrial systems
D) YouTube
Answer: C
A) White hat
B) Black hat
C) Cracker
D) Malware writer
Answer: A
A) Sniffing
B) DDoS
C) ARP spoofing
D) Session hijack
Answer: B
A) Legal test
B) Hacking challenge
C) Malicious activity
D) Network upgrade
Answer: C
A) Reporting
B) Planning
C) Tool selection
D) Evaluation
Answer: C
A) Ethical hacking
B) OS attacks
C) Non-technical attacks
D) Planning
Answer: B
A) Profit
B) Data deletion
C) Cybersecurity improvement
D) Password cracking
Answer: C
A) Ethical hacker
B) Auditor
C) Malicious hacker
D) Consultant
Answer: C
A) Playing games
B) Crashing systems
C) Maintaining anonymity
D) Making firewalls
Answer: C
A) Cleanup
B) Enumeration
C) Information gathering
D) Deployment
Answer: C
94. Which ethical hacking phase comes just before tool selection?
A) Planning
B) Reporting
C) Execution
D) Research
Answer: A
A) DNS hijacking
B) Firewall testing
C) Application debugging
D) Server-side scripting
Answer: A
A) Attack groups
B) Security companies
C) Virus developers
D) Hacktivist groups
Answer: B
A) Hackers
B) Public blogs
C) Competitors
D) System owners
Answer: D
A) System reset
B) Tool update
C) Evaluation
D) Tool download
Answer: C
A) User feedback
B) Malware deployment
C) OS updates
D) Password reset
Answer: B
A) Data deletion
B) Disabling accounts
C) Respecting privacy
D) Modifying settings
Answer: C