Ethical Hacking MCQ Quiz & Test

  1. What is the attack called “evil twin”?
  2. What are the forms of password cracking techniques?
  3. what is the primary goal of an Ethical Hacker ?
  4. What is the first phase of hacking?
  5. Which type of hacker represents the highest risk to your network?
  6. Hacking for a cause is called ..................
  7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
  8. Which are the four regional Internet registries?
  9. What port number does HTTPS use?
  10. Banner grabbing is an example of what?
  11. What does the TCP RST command do?
  12. A packet with all flags set is which type of scan?
  13. Why would an attacker want to perform a scan on port 137?
  14. Which tool can be used to perform a DNS zone transfer on Windows?
Ethical Hacking MCQ

Take Ethical Hacking Quiz To test your Knowledge

Below are few MCQ test that checks your basic knowledge of Ethical Hacking Framework. This Ethical Hacking Test contains around 15 questions of multiple choice type with 4 options. You have to select the right answer to a question. You can see the correct answer by clicking view answer link.

Also, Read Best Ethical Hacking interview questions.

  • Rogue access point
  • ARP poisoning
  • Session hijacking
  • MAC spoofing
View Answer
  • AttackSyllable
  • AttackBrute Forcing
  • AttacksHybrid
  • All of the above
View Answer
  • Avoiding detection
  • Testing security controls
  • Resolving security vulnerabilities
  • Determining return on investment for security measures
View Answer
  • Maintaining access
  • Gaining access
  • Reconnaissance
  • Scanning
View Answer
  • Black-hat hackers
  • Grey-hat hackers
  • Script kiddies
  • Disgruntled employees
Download Free : Ethical Hacking MCQ PDF
View Answer
  • Hacktivism
  • Black-hat hacking
  • . Active hacking
  • Activism
View Answer
  • Local access
  • Remote attack
  • Internal attack
  • Physical access
View Answer
View Answer
  • 53
  • 443
  • 80
  • 21
View Answer
  • Footprinting
  • Active operating system fingerprinting
  • Passive operating system fingerprinting
  • Application analysis
View Answer
  • Restores the connection to a previous state
  • Finishes a TCP connections
  • Resets the TCP connection
  • Starts a TCP connection
View Answer
  • Full Open
  • XMAS
  • TCP connect
  • Syn scan
View Answer
  • To check for file and print sharing on Windows systems
  • To discover proxy servers on a network
  • To discover a target system with the NetBIOS null session vulnerability
  • To locate the FTP service on the target host
View Answer
  • DNSlookup
  • nslookup
  • whois
  • ipconfig
View Answer
  • It makes security harder to enforce.
  • It removes the employee’s responsibility to make judgments.
  • It increases security.
  • It decreases security.
View Answer
  • Someone who is using his/her skills for defensive purposes.
  • Someone who is hacking for ethical reasons.
  • Someone who is using his/her skills for ethical reasons.
  • Someone who is using his/her skills for offensive purposes
View Answer
  • Active
  • Passive
  • DoS
  • Both 1 & 2
View Answer
  • The ethical hacker has authorization from the owner of the target.
  • The ethical hacker is just a cracker who is getting paid.
  • The ethical hacker does not use the same techniques or skills as a cracker.
  • The ethical hacker does it strictly for financial motives unlike a cracker.
View Answer
  • MAC spoofing
  • Session hijacking
  • Rogue access point
  • ARP poisoning
View Answer
  • Thirty-two characters
  • Sixteen characters
  • Sixty-four characters
  • Eight characters
View Answer
  • Ad hoc
  • Point to point
  • Infrastructure
  • BSS
View Answer
  • Cryptography
  • Encryption
  • Decryption
  • Penetration Testing
View Answer