Ethical Hacking MCQ

Ethical Hacking MCQ | Freshers & Experienced

  • Sharad Jaiswal
  • 13th Feb, 2021

We have listed here the best Ethical Hacking MCQ Questions for your basic knowledge of Ethical Hacking MCQ. This Ethical Hacking MCQ Test contains 15 multiple Choice Questions. You have to select the right answer to every question.

Ethical Hacking MCQ Questions

1) What is the first phase of hacking?

  • A. Attack
  • B.Gaining access
  • C.Reconnaissance
  • D.Maintaining access

2) What is the full form of ITA-2000?

  • A. Information Tech Act-2000
  • B.Information Technology Act-2000
  • C.Indian Technology Act-2000
  • D.International Technology Act-2000

3) What is the meaning of NOP?

  • A. Network Operation
  • B.No Operation
  • C.No one Point
  • D.None of the above

4) In which year the Indian IT Act, 2000 got updated?

  • A. 2008
  • B.2010
  • C.2012
  • D.2018

5) What is the sequence of a TCP connection?

  • A. SYN-ACK
  • B.SYN-ACK-FIN
  • C.SYN-SYN-ACK
  • D.SYN-SYN ACK-ACK

6) Keyloggers are a form of________

  • A. Trojan
  • B.Spyware
  • C.Shoulder surfing
  • D.Social engineering

7) What port is used to connect to the Active Directory in Windows 2000?

  • A. 139
  • B.225
  • C.389
  • D.445

8) What are the three types of scanning?

  • A. Port, network, and services
  • B.Port, network, and vulnerability
  • C.Grey, black, and white hat
  • D.Server, client, and network

9) Hacking for a cause is called______

  • A. Activism
  • B.Active hacking
  • C.Hacktivism
  • D.Black-hat hacking

10) To hide information inside a picture, what technology is used?

  • A. Rootkits
  • B.Bitmapping
  • C.Steganography
  • D.Image Rendering

11) What will an open port return from an ACK scan?

  • A. FIN
  • B.ACK
  • C.RST
  • D.None of the above

12) What is the attack called “evil twin”?

  • A. Rogue access point
  • B.ARP poisoning
  • C.MAC spoofing
  • D.Session hijacking

13) Which form of encryption does WPA use?

  • A. LEAP
  • B.TKIP
  • C.Shared key
  • D.None of the above

14) What are the forms of password cracking techniques is

  • A. Infrastructure
  • B.XMAS
  • C.phishing
  • D.sync

15) What is the primary goal of an ethical hacker?

  • A. Resolving security vulnerabilities
  • B.Maintaining access
  • C.Reconnaissance
  • D.Activism

16) What are the four Regional internet registries?

  • A. APNIC, PICNIC, NANIC, ARIN
  • B.APNIC, MOSTNIC, ARIN, RIPE NCC
  • C.APNIC, LACNIC, ARIN, RIPE NCC
  • D.APNIC, PICNIC, NANIC, RIPE NCC

17) HTTPs uses which port number?

  • A. 21
  • B.53
  • C.80
  • D.443

18) What is Maximum Length of an SSID?

  • A. Eight Character
  • B.Sixteen Character
  • C.Thirty-Two Character
  • D.Twenty-Four Character

19) Which of the following is a passive wireless discovery tool?

  • A. Kismet
  • B.Aircrack
  • C.Netsniff
  • D.NetStumbler

20) What is the preferred communications method used with systems on a bot-net?

  • A. E-mail
  • B.ICMP
  • C.IRC
  • D.TFTP

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.

Related MCQ/Quiz

01st
Feb
React JS MCQ
01st
Feb
Angular Js MCQ
01st
Feb
Angular 2 MCQ
01st
Feb
JSON MCQ
01st
Feb
PHP MCQ