Aptitude Reasoning English GK Computer Knowledge Programming Skill Banking Software Testing



Question - 1

What is the attack called "evil twin"?

  • Rogue access point
  • Session hijacking
  • MAC spoofing
  • ARP poisoning
Solutions
Question - 2

What is the ethics behind training how to hack a system?

  • To think like hackers and know how to defend such attacks
  • To hack a system without the permission
  • To hack a network that is vulnerable
  • To corrupt software or service using malware
Solutions
Question - 3

___________ has now evolved to be one of the most popular automated tools for unethical hacking.

  • Automated apps
  • Malware
  • Worms
  • Database software
Solutions
Question - 4

_____________ is the technique used in business organizations and firms to protect IT assets.

  • Ethical hacking
  • Unethical hacking
  • Fixing bugs
  • Internal data-breach
Solutions
Question - 5

Before performing any penetration test, through legal procedure, which key points listed below are not mandatory?

  • System and network
  • Know the nature of the organization
  • Type of broadband company used by the firm
  • Characteristics of work done in the firm
Solutions
Question - 6

Scanning is performed in which phase of a pen test?

  • Post-attack
  • Attack
  • Pre-attack
  • Reconnaissance
Solutions
Question - 7

What is the preferred communications method used with systems on a bot-net?

  • IRC
  • E-mail
  • ICMP
  • TFTP
Solutions
Question - 8

Which of the following best describes a distributed denial-of-service attack?

  • A DoS against an entire subnet, affecting multiple systems
  • A DoS against multiple systems across an enterprise network
  • A DoS against similar systems in different target networks
  • A DoS carried out by multiple systems
Solutions
Question - 9

What are the forms of password cracking techniques?

  • AttackSyllable
  • AttackBrute Forcing
  • AttacksHybrid
  • All of the above
Solutions
Question - 10

Hacking for a cause is called_____________.

  • Black-hat hacking
  • .Active hacking
  • Hacktivism
  • Activism
Solutions
Question - 11

What does the TCP RST command do?

  • Restores the connection to a previous state
  • Resets the TCP connection
  • Starts a TCP connection
  • Finishes a TCP connections
Solutions
Question - 12

Why would an attacker want to perform a scan on port 137?

  • To check for file and print sharing on windows systems
  • To discover proxy servers on a network
  • To discover a target system with the NetBIOS null session vulnerability
  • To locate the FTP service on the target host
Solutions
Question - 13

Which tool can be used to perform a DNS zone transfer on windows?

  • DNSlookup
  • ipconfig
  • whois
  • nslookup
Solutions
Question - 14

________ helps to classify arguments and situations, better understand a cyber-crime, and helps to determine appropriate actions.

  • Cyber-ethics
  • Social ethics
  • Cyber-bullying
  • Corporate behaviour
Solutions
Question - 15

Which of the following is a passive wireless discovery tool?

  • NetStumbler
  • Kismet
  • Netsniff
  • Aircrack
Solutions
Question - 16

Which of the following is true regarding WEP cracking?

  • Initialization vectors are small, get reused frequently, and are sent in cleartext.
  • Initialization vectors are small, get reused frequently, but are encrypted during transmission.
  • Initialization vectors are large, get reused frequently, and are sent in cleartext.
  • Initialization vectors are large, get reused frequently, but are encrypted during transmission.
Solutions
Question - 17

Which wireless mode connects machines directly to one another, without the use of an access point?

  • Ad hoc
  • Point to point
  • BSS
  • ESS
Solutions
Question - 18

What does the program EliteWrap do?

  • Provides secure, encrypted tunneling between hosts
  • Binds Trojans to legitimate files for exploitation later
  • Ports code easily between different operating systems
  • Provides proxy services to obfuscate source IPs
Solutions
Question - 19

What is the best reason to implement a security policy?

  • It makes security harder to enforce
  • It removes the employee's responsibility to make judgements
  • It increases security
  • It decreases security
Solutions
Question - 20

What are the two basic types of attacks?

  • Active
  • Passive
  • DoS
  • Both 1 & 2
Solutions
Tags:
Ethical hacking MCQ (Multiple Choice Questions), Advanced Ethical hacking MCQ, Ethical hacking MCQ Online test,Ethical hacking MCQ Questions and answers PDF, Ethical hacking Interview Questions With Answers, Ethical hacking Technical Questions with full explanation