Ethical Hacking MCQ Quiz & Test

Take Ethical Hacking Quiz To test your Knowledge

Below are few MCQ test that checks your basic knowledge of Ethical Hacking Framework. This Ethical Hacking Test contains around 15 questions of multiple choice type with 4 options. You have to select the right answer to a question. You can see the correct answer by clicking view answer link.

Also, Read Best Ethical Hacking interview questions.

1. What is the attack called “evil twin”?

  • Rogue access point
  • ARP poisoning
  • Session hijacking
  • MAC spoofing
View Answer

2. What are the forms of password cracking techniques?

  • AttackSyllable
  • AttackBrute Forcing
  • AttacksHybrid
  • All of the above
View Answer

3. what is the primary goal of an Ethical Hacker ?

  • Avoiding detection
  • Testing security controls
  • Resolving security vulnerabilities
  • Determining return on investment for security measures
View Answer

4. What is the first phase of hacking?

  • Maintaining access
  • Gaining access
  • Reconnaissance
  • Scanning
View Answer

5. Which type of hacker represents the highest risk to your network?

  • Black-hat hackers
  • Grey-hat hackers
  • Script kiddies
  • Disgruntled employees
View Answer

6. Hacking for a cause is called ..................

  • Hacktivism
  • Black-hat hacking
  • . Active hacking
  • Activism
View Answer

7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?

  • Local access
  • Remote attack
  • Internal attack
  • Physical access
View Answer

8. Which are the four regional Internet registries?

  • APNIC, MOSTNIC, ARIN, RIPE NCC
  • APNIC, PICNIC, NANIC, ARIN
  • APNIC, PICNIC, NANIC, RIPE NCC
  • APNIC, LACNIC, ARIN, RIPE NCC
View Answer

9. What port number does HTTPS use?

  • 53
  • 443
  • 80
  • 21
View Answer

10. Banner grabbing is an example of what?

  • Footprinting
  • Active operating system fingerprinting
  • Passive operating system fingerprinting
  • Application analysis
View Answer

11. What does the TCP RST command do?

  • Restores the connection to a previous state
  • Finishes a TCP connections
  • Resets the TCP connection
  • Starts a TCP connection
View Answer

12. A packet with all flags set is which type of scan?

  • Full Open
  • XMAS
  • TCP connect
  • Syn scan
View Answer

13. Why would an attacker want to perform a scan on port 137?

  • To check for file and print sharing on Windows systems
  • To discover proxy servers on a network
  • To discover a target system with the NetBIOS null session vulnerability
  • To locate the FTP service on the target host
View Answer

14. Which tool can be used to perform a DNS zone transfer on Windows?

  • DNSlookup
  • nslookup
  • whois
  • ipconfig
View Answer

15. What is the best reason to implement a security policy?

  • It makes security harder to enforce.
  • It removes the employee’s responsibility to make judgments.
  • It increases security.
  • It decreases security.
View Answer

16. What does the term "Ethical Hacking" mean?

  • Someone who is using his/her skills for defensive purposes.
  • Someone who is hacking for ethical reasons.
  • Someone who is using his/her skills for ethical reasons.
  • Someone who is using his/her skills for offensive purposes
View Answer

17. What are the two basic types of attacks ?

  • Active
  • Passive
  • DoS
  • 1 & 2
View Answer

18. What is the major difference between an 'Ethical Hacker' and a 'Cracker'?

  • The ethical hacker has authorization from the owner of the target.
  • The ethical hacker is just a cracker who is getting paid.
  • The ethical hacker does not use the same techniques or skills as a cracker.
  • The ethical hacker does it strictly for financial motives unlike a cracker.
View Answer

19. What is the attack called “evil twin”?

  • MAC spoofing
  • Session hijacking
  • Rogue access point
  • ARP poisoning
View Answer

20. What is the maximum length of an SSID?

  • Thirty-two characters
  • Sixteen characters
  • Sixty-four characters
  • Eight characters
View Answer

21. Which wireless mode connects machines directly to one another, without the use of an access point?

  • Ad hoc
  • Point to point
  • Infrastructure
  • BSS
View Answer

Write For Us.

Contribute the Community.