MCQs > IT & Programming > Ethical Hacking MCQs > Basic Ethical Hacking MCQs

Basic Ethical Hacking MCQ

1. _____ is a protocol for securely accessing a remote computer.

Answer

Correct Answer: Secure Shell (SSH)

Note: This Question is unanswered, help us to find answer for this one

2. With ____, you can have your desktop computer or laptop start in both windows and linux.

Answer

Correct Answer: Grand Unified Bootloader

Note: This Question is unanswered, help us to find answer for this one

3. Hackers use __________ to execute arbitrary scripts through the web browser.

Answer

Correct Answer: Cross-site scripting (XSS)

Note: This Question is unanswered, help us to find answer for this one

4. Hackers can gain access to computer systems through the use of ____.

Answer

Correct Answer: Ports

Note: This Question is unanswered, help us to find answer for this one

5. Which of the following programming languages are commonly associated with Buffer overflows?

Answer

Correct Answer: C++

Note: This Question is unanswered, help us to find answer for this one

6. In relation to Wireshark filters, which of the following operators is/are equivalent to the equal function?

Answer

Correct Answer: =
===
==
eq

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

7. Which of the following are the advantages of using the symmetric cryptography algorithms?

Answer

Correct Answer: They preserve confidentiality.
They increase speed.
They provide authenticity.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

8. ln ethical hacking, which Of the following information is gathered during the enumeration phase?

Answer

Correct Answer: Usernames
Server data

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

9. Identify the features of session hijacking.

Answer

Correct Answer: Cleartext transmission.
No account lockout for invalid session IDs

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

10. Which of the following operating systems are affected by the Stacheldraht tool for denial-of—service attacks?

Answer

Correct Answer: Unix
Solaris
Linux

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

11. Which two of the following are the features of symmetric encryption algorithm, Blowf‌ish?

Answer

Correct Answer: It can be used on both 32-bit and 64-bit processors.
It is simple and strong.

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

12. Which of the following are the correct syntaxes for using ping command on Windows?

Answer

Correct Answer: ping
ping

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

13. Which of the following is an asymmetric encryption algorithm, which is of a variable length, is a one-way hash function and is a modification of MD5?

Answer

Correct Answer: HAVAL

Note: This Question is unanswered, help us to find answer for this one

14. While using the BackTrack tool with Linux, which of the following commands can be used for renaming a text file from oIdExample.txt to newExample.txt?

Answer

Correct Answer: mv oldExample.txt newExample.txt

Note: This Question is unanswered, help us to find answer for this one

15.

Which of the following protocols send clear information and can be easy targets for sniff‌ing?

i) HTTP

ii) NNTP

iii) FTP

iv) IMAP


Answer

Correct Answer:

All Options i). ii), iii) and iv). 


Note: This Question is unanswered, help us to find answer for this one

16. Which of the following is the correct syntax of the command that can be used to test whether or not a target FTP server is vulnerable to the FTP bounce attack?

Answer

Correct Answer: nmap —b

Note: This Question is unanswered, help us to find answer for this one

17. Which of the following is the correct syntax of the command that can be used for performing a sneaky scan and for analyzing its behavior in Wireshark?

Answer

Correct Answer: nmap —T1

Note: This Question is unanswered, help us to find answer for this one

18. Which of the following network scanning processes involves the use of an Internet Control Message Protocol (ICMP) message?

Answer

Correct Answer: Pinging

Note: This Question is unanswered, help us to find answer for this one

19. Which of the following is the syntax of Hydra for brute-forcing a service with the username set to "administrator"?

Answer

Correct Answer: Hydra —L administrator —P password.txt

Note: This Question is unanswered, help us to find answer for this one

20. While using Medusa for brute force attack, which of the following parameters is used for "Service to attack"?

Answer

Correct Answer: -M

Note: This Question is unanswered, help us to find answer for this one

21. Which of the following echo requests is used by a Fraggle attack?

Answer

Correct Answer: UDP

Note: This Question is unanswered, help us to find answer for this one

22. During which of the following types of scanning, carefully crafted messages or packets are sent to a target computer by using wellsknown port numbers that are less than or equal to 1024?

Answer

Correct Answer: Port scanning

Note: This Question is unanswered, help us to find answer for this one

23. While creating a PDF document with launch action, which of the following parameters is used for defining the type of application that should run?

Answer

Correct Answer: IF

Note: This Question is unanswered, help us to find answer for this one

24. In which ofthe following application-level attacks, SQL queries are crafted by an attacker for corrupting a database?

Answer

Correct Answer: Jam

Note: This Question is unanswered, help us to find answer for this one

25. Which of the following is the correct syntax of the command for creating an ACK packet using HPING3 and sending it to port 80 on a victim?

Answer

Correct Answer: Hping3 —A -p 80

Note: This Question is unanswered, help us to find answer for this one

26. During which of the following DOS attacks, custom-crafted fragmented packets, having offset values that overlap during the attempted rebuild. are sent by an attacker?

Answer

Correct Answer: Teardrop

Note: This Question is unanswered, help us to find answer for this one

27. While scanning source ports using the nmap command, which of the following parameters is used for helping a user in specifying a source port?

Answer

Correct Answer: -g

Note: This Question is unanswered, help us to find answer for this one

28. In which ofthe following types of attacks, cipher text is compared against the pro-computed hashes for f‌inding the match?

Answer

Correct Answer: Rainbow table attack

Note: This Question is unanswered, help us to find answer for this one

29.

The amitis tool, which is used for creating Trojans, opens which of the following ports for giving a hacker complete control over a victim's computer?

Answer

Correct Answer: 27551

Note: This Question is unanswered, help us to find answer for this one

30. While performing a check for open ports via three-way handshake in port scanning, which of the following TCP f‌lags is used for instructing the sending system to immediately send all buffered data?

Answer

Correct Answer: PSH

Note: This Question is unanswered, help us to find answer for this one

31. Which of the following Linux directories is used for containing references (represented as f‌iles with special properties) to all the CPU peripheral hardware?

Answer

Correct Answer: /dev

Note: This Question is unanswered, help us to find answer for this one

32. Which of the following is the correct syntax of the HpingZ command that can be used for scanning a vulnerable host for the zombie scan?

Answer

Correct Answer: hpin92 —S -r

Note: This Question is unanswered, help us to find answer for this one

33. While creating a backdoor with the SET tool, which Of the following commands can be used for interacting with the shell after the session has been opened?

Answer

Correct Answer: sessions —i 1

Note: This Question is unanswered, help us to find answer for this one

34.

Which malware performs the following activities?

 Displays pop-ups and nag screens.

Changes the start page of a browser.


Answer

Correct Answer:

Adware 


Note: This Question is unanswered, help us to find answer for this one

35. Which type of malware has the following characteristics?

Answer

Correct Answer: Rootkits

Note: This Question is unanswered, help us to find answer for this one

36. Which of the following options is a program that is used for automating an action in such a way that the action can be repeatedly performed at a much higher rate and for a longer period than a human Operator could perform?

Answer

Correct Answer: Bot

Note: This Question is unanswered, help us to find answer for this one

37.

Choose True or False.

Sniffing can be done in both ways, i.e. from command line utility and graphic user interface (GUI).


Answer

Correct Answer:

True 


Note: This Question is unanswered, help us to find answer for this one

38.

Which of the following are sniffing tools?

i) Wireshark

ii) Cain and Abel

iii) Dsniff

iv) Ettercap

v) Tcpdump


Answer

Correct Answer:

All of the above


Note: This Question is unanswered, help us to find answer for this one

39. While using the Trojan detection tool, netstat, which of the following commands is used for detecting open ports?

Answer

Correct Answer: netstat —an

Note: This Question is unanswered, help us to find answer for this one

40. Which of the following Linux directories contains programs for use by the system and system administrator?

Answer

Correct Answer: /sbin

Note: This Question is unanswered, help us to find answer for this one

41. In order to prevent Trojan attacks, which ofthe following tools should be used for real-time tracking of port usage?

Answer

Correct Answer: TCPView

Note: This Question is unanswered, help us to find answer for this one

42. Which of the following Linux commands is used for showing local or remote established connections?

Answer

Correct Answer: netstat

Note: This Question is unanswered, help us to find answer for this one

43. For specifying a maximum transmission unit {MTU), which of the following is the correct nmap command that will generate a 32 byte packet?

Answer

Correct Answer: nmap —mtu 32

Note: This Question is unanswered, help us to find answer for this one

44. Which of the following operating systems are vulnerable to distributed denial-of—service (DDOS) attacks?

Answer

Correct Answer: All of the above.

Note: This Question is unanswered, help us to find answer for this one

45. Which of the following options indicates a special Linux permission, which makes a file unchangeable?

Answer

Correct Answer: i

Note: This Question is unanswered, help us to find answer for this one

46.

During fingerprinting, which Of the following elements are analyzed for determining the operating system?

i)Don‘t fragment bit

ii)Window size

iii)Time-to-live on the outbound packet

iv)Type of service


Answer

Correct Answer:

All Options i), ii), iii) and iv).


Note: This Question is unanswered, help us to find answer for this one

47. While testing for weak authentication during fingerprinting MYSOL, which of the following commands is used for logging in to the MYSQL server and manipulating things after the credentials have been cracked?

Answer

Correct Answer: root@root: mysql —h —u root —p

Note: This Question is unanswered, help us to find answer for this one

48. Which of the following ports is used for HTTPS traff‌ic, which is secured by SSL?

Answer

Correct Answer: 443

Note: This Question is unanswered, help us to find answer for this one

49. Which of the following lPSec mechanisms is used for providing methods for the purpose of authenticating information as well as for encrypting the data?

Answer

Correct Answer: Encapsulating Security Payload

Note: This Question is unanswered, help us to find answer for this one

50. Proxies operate at which of the following layers of the Open System Interconnection model?

Answer

Correct Answer: Application layer

Note: This Question is unanswered, help us to find answer for this one

51. While using the BackTrack tool with Linux. which of the following commands is used for changing the password of the Linux box?

Answer

Correct Answer: passwd

Note: This Question is unanswered, help us to find answer for this one

52. In relation to ethical hacking, which of the following statements is correct about botnet?

Answer

Correct Answer: It is a group of computers that is controlled without the knowledge of their owners.

Note: This Question is unanswered, help us to find answer for this one

53. Which of the following protocols is used by the BOCK tool that is used for exploiting covert channels?

Answer

Correct Answer: IGMP

Note: This Question is unanswered, help us to find answer for this one

54. What is the hexadecimal value of the NOP instruction that is applied to an Intel processor?

Answer

Correct Answer: 0x90

Note: This Question is unanswered, help us to find answer for this one

55. Which of the following wardriving tools is a network detector, sniffer, and intrusion detection system used on Linux?

Answer

Correct Answer: Kismet

Note: This Question is unanswered, help us to find answer for this one

56. Which of the following options represents the process of exploiting holes in a poorly-configured software?

Answer

Correct Answer: Shrink Wrap Code

Note: This Question is unanswered, help us to find answer for this one

57. Which of the following Linux commands is used for displaying the information of logged on users and their activities?

Answer

Correct Answer: w

Note: This Question is unanswered, help us to find answer for this one

58. During which ofthe following attacks, an attacker has the plaintext and ciphertext of one or more messages and this information is used for determining the key in use?

Answer

Correct Answer: Known Plaintext Attack

Note: This Question is unanswered, help us to find answer for this one

59.

Which of the following options are the effects Of a DOS attack?

i)Resource unavailability.

ii)lncreased spam e-mail.

iii)lncreased ads and pop-ups.


Answer

Correct Answer:

Only options i) and ii).


Note: This Question is unanswered, help us to find answer for this one

60.

Identify the type of denial-of—service (DOS) attack from the following statement

This attack queues up the packets that have bad source IP; uses memory and resources; and eventually hangs, reboots or crashes the system


Answer

Correct Answer:

SYN attack


Note: This Question is unanswered, help us to find answer for this one

61.

Which of the following options is a Linux/Unix sniff‌ing tool that is designed for graphically displaying a system's incoming and outgoing connections?

Answer

Correct Answer: EtherApe

Note: This Question is unanswered, help us to find answer for this one

62.

Using Nmap, which Of the following is the correct syntax for performing a ping to a remote Windows or Linux Operating system?


Answer

Correct Answer:

NMAP —sP —v


Note: This Question is unanswered, help us to find answer for this one

63. In relation to f‌ingerprinting, which of the following is the correct syntax of the command, which is used for identifying the operating system that is serving a website and all the opened ports associated with the domain name? (Assume the domain name as abcExample.com.)

Answer

Correct Answer: $nmap -0 -v abcExample.com

Note: This Question is unanswered, help us to find answer for this one

64. While using the Netcat tool, which of the following commands is used for setting up a listener?

Answer

Correct Answer: nc -n -v -| -p 80

Note: This Question is unanswered, help us to find answer for this one

65. While using the BackTrack tool with Linux, which of the following commands can be used for displaying the contents of the password.txt file?

Answer

Correct Answer: cat password.txt

Note: This Question is unanswered, help us to find answer for this one

66. Which of the following is/are the possible way(s) to manipulate programs through which a technical user may exploit stack-based overflows?

Answer

Correct Answer: All of the above.

Note: This Question is unanswered, help us to find answer for this one

67. During which of the following attacks, a custom wordlist containing a list of all possible username and password combinations is used?

Answer

Correct Answer: Dictionary Attacks

Note: This Question is unanswered, help us to find answer for this one

68. Which of the following frameworks is simpler and more eff‌icient for creating and manipulating PDF frameworks?

Answer

Correct Answer: Origami framework

Note: This Question is unanswered, help us to find answer for this one

69. In relation to the nmap command in OS f‌ingerprinting, which of the following options can be used for performing both OS and service version detection?

Answer

Correct Answer: -A

Note: This Question is unanswered, help us to find answer for this one

70.

While using the Netcap tool, which of the following commands is used for performing port scanning?

Answer

Correct Answer:

nc -v —2 -W1 lPaddress -  


Note: This Question is unanswered, help us to find answer for this one

71.

Which of the following commands is used for performing a Xmas tree scan with Nmap?


Answer

Correct Answer:

NMAP —sX —v


Note: This Question is unanswered, help us to find answer for this one

72. In relation to f‌ingerprinting, which of the following is the correct syntax ofthe nmap command, which is used for checking whether or not port 443 is Open? (Assume the domain name as abcExample.com.)

Answer

Correct Answer: $nmap -sT -p 443 abcExample.com

Note: This Question is unanswered, help us to find answer for this one

73. Which of the following keyboard shortcuts stops working during a Trojan infection?

Answer

Correct Answer: Ctrl + Alt + Del

Note: This Question is unanswered, help us to find answer for this one

74. Which of the following commands can be used for creating a firewall rule in iptable, which will result the blocking of ICMP ECHO requests from the outside sources and will disable ping sweeps on a network?

Answer

Correct Answer: $iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP

Note: This Question is unanswered, help us to find answer for this one

75. In relation to switched network sniff‌ing, which of the following options is represented by a switchport?

Answer

Correct Answer: In relation to switched network sniff‌ing, which of the following options is represented by a switchport?

Note: This Question is unanswered, help us to find answer for this one

76. In relation to ethical hacking. which of the following options refers to a method. which is used for determining the type of operating system running on a remote computer?

Answer

Correct Answer: Fingerprinting

Note: This Question is unanswered, help us to find answer for this one

77.

Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?


Answer

Correct Answer:

nmap —sP —PE —PA


Note: This Question is unanswered, help us to find answer for this one

78.

Which of the following statements is/are correct about stealth scan or half-Open scan?

i) With stealth scan, the chances of triggering the detection mechanism are high.

ii) Stealth scan is less reliable as compared to full-Open scan.


Answer

Correct Answer:

Only statement ii) is correct.  


Note: This Question is unanswered, help us to find answer for this one

79. Which of the given types of viruses has the following characteristics?

Answer

Correct Answer: Shell virus

Note: This Question is unanswered, help us to find answer for this one