0% found this document useful (0 votes)
32 views9 pages

Document

The document discusses the basics of ethical hacking. It provides 33 multiple choice questions about ethical hacking concepts like white hat and black hat hacking, tools used for ethical hacking like scanners and proxies, the steps hackers use including reconnaissance and maintaining access, and definitions for different types of hackers such as white hat, black hat, and grey hat hackers. It also covers topics like getting permission before ethical hacking and legal risks associated with disclosing personal data.

Uploaded by

Hamza khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views9 pages

Document

The document discusses the basics of ethical hacking. It provides 33 multiple choice questions about ethical hacking concepts like white hat and black hat hacking, tools used for ethical hacking like scanners and proxies, the steps hackers use including reconnaissance and maintaining access, and definitions for different types of hackers such as white hat, black hat, and grey hat hackers. It also covers topics like getting permission before ethical hacking and legal risks associated with disclosing personal data.

Uploaded by

Hamza khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Chapter 5

Basics of Hacking (CO5)

1. Ethical Hacking is also known as

A. Black Hat Hacking.

B. White Hat Hacking.

C. Encryption.

D. None of

these. Ans. B

2. Tool(s) used by ethical hacker .

A. Scanner

B. Decoder

C. Proxy

D. All of

these. Ans. D

3. Vulnerability scanning in Ethical hacking finds .

A. Strengths.

B. Weakness.

C. A CB

D. None of

these. Ans. B

4. Ethical hacking will allow to all the massive security breaches.

A. Remove.

B. Measure.

C. Reject.

D. None of

these. Ans. B
5. Sequential step hackers use are: _ _ _ _.

A. Maintaining Access.

B. Reconnaissance

C. Scanning.

D. Gaining Access.

A. B, C, D,A

B. B, A, C,D

C. A, B, C,D

D. D, C, B,A

Ans. A

6. is the art of exploiting the human elements to gain access to the authorized user.

A. Social Engineering.

B. IT Engineering.

C. Ethical Hacking.

D. None of the

above. Ans. A

7. The term cracker refers to

A. Black hat hacker.

B. White hat hacker.

C. Grey hat hacker.

D. None of the

above. Ans. A

8. Who described a dissertation on fundamentals of hacker’s attitude?

A. G. Palma.

B. Raymond.
C. Either.

D. Jhon

Browman. Ans. B

9. Computer Hackers have been in existence for more than a .

A. Decade.

B. Year.

C. Century

D. Era.

Ans. C

10. Hackers do hack for?

A. Fame.

B. Profit.

C. Revenge.

D. All the

above Ans. D

11. The intent of ethical hacker is to discover vulnerabilities from a point of view

to better secure system.

A. Victims.

B. Attackers.

C. Both A C B

D. None

ofthese. Ans. B

12. Security audits are usually based on

A. Entries.

B. Checklists.
C. Both A C B

D. None of the

above Ans. B

13. Ethical hacking consist of

A. Penetration testing.

B. Intrusion testing.

C. Red teaming.

D. All of the

above. Ans. D

14. is a person who find and exploits the weakness in computer system.

A. Victim

B. Hacker

C. Developer

D. None of the

above. Ans. B

15. A white hat hacker is the one who

A. Fix identifies weakness

B. Steal the data

C. Identifies the weakness and leave message to owner

D. None of the

above Ans. A

16. A black hat hacker is the one who

A. Fix identifies weakness

B. Steal the data

C. Identifies the weakness and leave message to owner

D. None of the above.


Ans. B

17. A grey hat hacker is the one who

A. Fix identifies weakness

B. Steal the data

C. Identifies the weakness and leave message to owner

D. None of the

above Ans. C

18. Keeping information secured can protect an organization image and


save and organization lot

of money

A. True

B. False

Ans. A

19. Information is a one of the most valuable assets of organization

A. True

B. False

Ans. A

20. To catch a thief, think like

A. Police

B. Forensics

C. Thief

D. Hacker

Ans. C

21. Connecting into network through a rogue modem attached to computer


behind a firewall is an
example of -

A. Nontechnical attacks

B. Network infrastructure attack

C. Operating system attack

D. Application and other specialized

attack Ans. B

22. comprise of large portion of hacker attacks simply because every computer has

one and so well know exploits can be used against them

A. Nontechnical attacks

B. Network infrastructure attack

C. Operating systemattack

D. Application and other specialized

attack Ans. C

23. should be done before ethical hacking process.

A. Data gathering.

B. Attacking

C. Planning

D. Research

Ans. C

24. Which permission is necessary before ethical hacking?

A. Written permission.

B. Decision maker permission

C. Privacy permission

D. Risk

permission. Ans. A

25. Which tool is used to crack the password?


A. Nmap

B. LC4

C. ToneLOC

D. Nessus

Ans. B

26. Which tool is used to encrypt Email?

A. WebInspect

B. QualyGuard

C. PGP (pretty good privacy)

D. None of the

above. Ans. C

27. Malicious attacker often think like?

A. Thieves

B. Kidnapper

C. Both A C B

D. None of the

above Ans. C

28. Which hacker try to distribute political or social message through their work?

A. Black hat hacker

B. Hactivist

C. Script kiddes

D. White hat

hacker Ans. B

29. . are part of organized crime on internet.

A. Criminal
B. Antinationalist

C. Hacker for hire

D. None of the

above Ans. C

30. Leaking your company data to the outside network without prior permission of

senior authority is a crime.

A. True

B. False

Ans. A

31. A penetration tester must identify and keep in mind

the C requirements of a firm while evaluating the security

postures.

A. privacy and security

B. rules and regulations

C. hacking techniques

D. ethics to talk to

seniors Ans. A

32 The legal risks of ethical hacking include lawsuits due to of personal data.

A. stealing

B. disclosure

C. deleting

D. hacking

Ans. B

33. Before performing any penetration test, through legal procedure, which key points

listed below is not mandatory?

A. Know the nature of the organization

B. Characteristics of work done in the firm


C. System and network

D. Type of broadband company used by the

firm Ans. D

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy