Ethical Hacking MCQ

Ethical Hacking MCQ

  • Admin
  • 10th Feb, 2023

Take Ethical Hacking Quiz to Test Your Knowledge

Practice here the best Ethical Hacking MCQ Questions that are designed to check your basic skills and knowledge about Ethical Hacking. This Ethical Hacking MCQ Test contains 25+ Multiple Choice Questions. Apart from this, you can also download the Ethical Hacking MCQ PDF below completely free. 

Also, Read the Best Ethical Hacking Interview Questions.

Ethical Hacking MCQ

1) What is the attack called “evil twin”?

  • A. Rogue access point
  • B.ARP poisoning
  • C.Session hijacking
  • D.MAC spoofing

2) What are the forms of password cracking techniques?

  • A. AttackSyllable
  • B.AttackBrute Forcing
  • C.AttacksHybrid
  • D.All of the above

3) what is the primary goal of an Ethical Hacker ?

  • A. Avoiding detection
  • B.Testing security controls
  • C.Resolving security vulnerabilities
  • D.Determining return on investment for security measures

4) What is the first phase of hacking?

  • A. Maintaining access
  • B.Gaining access
  • C.Reconnaissance
  • D.Scanning

5) Which type of hacker represents the highest risk to your network?

  • A. Black-hat hackers
  • B.Grey-hat hackers
  • C.Script kiddies
  • D.Disgruntled employees
Download Free : Ethical Hacking MCQ PDF

6) Hacking for a cause is called ..................

  • A. Hacktivism
  • B.Black-hat hacking
  • C.. Active hacking
  • D.Activism

7) When a hacker attempts to attack a host via the Internet it is known as what type of attack?

  • A. Local access
  • B.Remote attack
  • C.Internal attack
  • D.Physical access

8) Which are the four regional Internet registries?


9) What port number does HTTPS use?

  • A. 53
  • B.443
  • C.80
  • D.21

10) Banner grabbing is an example of what?

  • A. Footprinting
  • B.Active operating system fingerprinting
  • C.Passive operating system fingerprinting
  • D.Application analysis

11) What does the TCP RST command do?

  • A. Restores the connection to a previous state
  • B.Finishes a TCP connections
  • C.Resets the TCP connection
  • D.Starts a TCP connection

12) A packet with all flags set is which type of scan?

  • A. Full Open
  • B.XMAS
  • C.TCP connect
  • D.Syn scan

13) Why would an attacker want to perform a scan on port 137?

  • A. To check for file and print sharing on Windows systems
  • B.To discover proxy servers on a network
  • C.To discover a target system with the NetBIOS null session vulnerability
  • D.To locate the FTP service on the target host

14) Which tool can be used to perform a DNS zone transfer on Windows?

  • A. DNSlookup
  • B.nslookup
  • C.whois
  • D.ipconfig

15) What is the best reason to implement a security policy?

  • A. It makes security harder to enforce.
  • B.It removes the employee’s responsibility to make judgments.
  • C.It increases security.
  • D.It decreases security.

16) What does the term "Ethical Hacking" mean?

  • A. Someone who is using his/her skills for defensive purposes.
  • B.Someone who is hacking for ethical reasons.
  • C.Someone who is using his/her skills for ethical reasons.
  • D.Someone who is using his/her skills for offensive purposes

17) What are the two basic types of attacks ?

  • A. Active
  • B.Passive
  • C.DoS
  • D.Both 1 & 2

18) What is the major difference between an 'Ethical Hacker' and a 'Cracker'?

  • A. The ethical hacker has authorization from the owner of the target.
  • B.The ethical hacker is just a cracker who is getting paid.
  • C.The ethical hacker does not use the same techniques or skills as a cracker.
  • D.The ethical hacker does it strictly for financial motives unlike a cracker.

19) What is the attack called “evil twin”?

  • A. MAC spoofing
  • B.Session hijacking
  • C.Rogue access point
  • D.ARP poisoning

20) What is the maximum length of an SSID?

  • A. Thirty-two characters
  • B.Sixteen characters
  • C.Sixty-four characters
  • D.Eight characters

21) Which wireless mode connects machines directly to one another, without the use of an access point?

  • A. Ad hoc
  • B.Point to point
  • C.Infrastructure
  • D.BSS

22) The process of professionally or ethically hacking a message is called

  • A. Cryptography
  • B.Encryption
  • C.Decryption
  • D.Penetration Testing

23) Ethical hacking is also known as .................

  • A. White hat Hacking
  • B.Penetration Testing
  • C.Both white hat hacking & penetration testing
  • D.None of the above

24) What are the advantages of Ethical Hacking?

  • A. It is used to test how good security is on your network.
  • B.It is used to recover the lost of information, especially when you lost your password.
  • C.It is used to perform penetration testing to increase the security of the computer and network.
  • D.All of the above

25) Which character is typically used first by the penetration tester?

  • A. Semicolon
  • B.Dollar sign
  • C.Single quote
  • D.None of the above

26) A hacktivist is someone who ..................

  • A. hacks computers or Web sites in an attempt to promote a political ideology
  • B.attempts to destroy the infrastructure components of governments
  • C.violates computer or Internet security maliciously or for illegal personal gain
  • D.attempts to gain financially and/or disrupt a company's information systems and business operations

2 comment(s) :

  •   Reply

    Aritra Sarkar

    11th Mar, 2023

    It's very good

  •   Reply

    Tanaya Kundu

    11th Mar, 2023

    Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. Hackers are motivated by personal gain, to make a statement, or just because they can.

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.

Related MCQ/Quiz

MS Excel MCQ
Kotlin MCQ
Terraform MCQ
TensorFlow MCQ