Ethical Hacking MCQ

  1. What is the attack called “evil twin”?
  2. What are the forms of password cracking techniques?
  3. what is the primary goal of an Ethical Hacker ?
  4. What is the first phase of hacking?
  5. Which type of hacker represents the highest risk to your network?
  6. Hacking for a cause is called ..................
  7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
  8. Which are the four regional Internet registries?
  9. What port number does HTTPS use?
  10. Banner grabbing is an example of what?
  11. What does the TCP RST command do?
  12. A packet with all flags set is which type of scan?
  13. Why would an attacker want to perform a scan on port 137?
  14. Which tool can be used to perform a DNS zone transfer on Windows?
Ethical Hacking MCQ

Take Ethical Hacking Quiz to Test Your Knowledge

Practice here the best Ethical Hacking MCQ Questions that are designed to check your basic skills and knowledge about Ethical Hacking. This Ethical Hacking MCQ Test contains 25+ Multiple Choice Questions. Apart from this, you can also download the Ethical Hacking MCQ PDF below completely free. 

Also, Read the Best Ethical Hacking Interview Questions.

  • Rogue access point
  • ARP poisoning
  • Session hijacking
  • MAC spoofing
View Answer
  • AttackSyllable
  • AttackBrute Forcing
  • AttacksHybrid
  • All of the above
View Answer
  • Avoiding detection
  • Testing security controls
  • Resolving security vulnerabilities
  • Determining return on investment for security measures
View Answer
  • Maintaining access
  • Gaining access
  • Reconnaissance
  • Scanning
View Answer
  • Black-hat hackers
  • Grey-hat hackers
  • Script kiddies
  • Disgruntled employees
Download Free : Ethical Hacking MCQ PDF
View Answer
  • Hacktivism
  • Black-hat hacking
  • . Active hacking
  • Activism
View Answer
  • Local access
  • Remote attack
  • Internal attack
  • Physical access
View Answer
View Answer
  • 53
  • 443
  • 80
  • 21
View Answer
  • Footprinting
  • Active operating system fingerprinting
  • Passive operating system fingerprinting
  • Application analysis
View Answer
  • Restores the connection to a previous state
  • Finishes a TCP connections
  • Resets the TCP connection
  • Starts a TCP connection
View Answer
  • Full Open
  • XMAS
  • TCP connect
  • Syn scan
View Answer
  • To check for file and print sharing on Windows systems
  • To discover proxy servers on a network
  • To discover a target system with the NetBIOS null session vulnerability
  • To locate the FTP service on the target host
View Answer
  • DNSlookup
  • nslookup
  • whois
  • ipconfig
View Answer
  • It makes security harder to enforce.
  • It removes the employee’s responsibility to make judgments.
  • It increases security.
  • It decreases security.
View Answer
  • Someone who is using his/her skills for defensive purposes.
  • Someone who is hacking for ethical reasons.
  • Someone who is using his/her skills for ethical reasons.
  • Someone who is using his/her skills for offensive purposes
View Answer
  • Active
  • Passive
  • DoS
  • Both 1 & 2
View Answer
  • The ethical hacker has authorization from the owner of the target.
  • The ethical hacker is just a cracker who is getting paid.
  • The ethical hacker does not use the same techniques or skills as a cracker.
  • The ethical hacker does it strictly for financial motives unlike a cracker.
View Answer
  • MAC spoofing
  • Session hijacking
  • Rogue access point
  • ARP poisoning
View Answer
  • Thirty-two characters
  • Sixteen characters
  • Sixty-four characters
  • Eight characters
View Answer
  • Ad hoc
  • Point to point
  • Infrastructure
  • BSS
View Answer
  • Cryptography
  • Encryption
  • Decryption
  • Penetration Testing
View Answer
  • White hat Hacking
  • Penetration Testing
  • Both white hat hacking & penetration testing
  • None of the above
View Answer
  • It is used to test how good security is on your network.
  • It is used to recover the lost of information, especially when you lost your password.
  • It is used to perform penetration testing to increase the security of the computer and network.
  • All of the above
View Answer
  • Semicolon
  • Dollar sign
  • Single quote
  • None of the above
View Answer
  • hacks computers or Web sites in an attempt to promote a political ideology
  • attempts to destroy the infrastructure components of governments
  • violates computer or Internet security maliciously or for illegal personal gain
  • attempts to gain financially and/or disrupt a company's information systems and business operations
View Answer