Ethical Hacking Multiple Choice Question
Question : 1 What is the primary goal of ethical hacking?
A
To exploit vulnerabilities for personal gain
B
To penetrate networks without permission
C
To identify and fix security vulnerabilities
D
To cause harm to computer systems
Answer:
Question : 2 Which term refers to a program or script that automates the process of finding security vulnerabilities?
A
Malware
B
Virus
C
Exploit
D
Security Scanner
Answer:
Question : 3 What is the practice of gathering information about a target system without directly interacting with it?
A
Hacking
B
Footprinting
C
Phishing
D
Spoofing
Answer:
Question : 4 Which type of attack involves flooding a network or system with excessive traffic to make it unavailable to users?
A
Phishing
B
Denial of Service (DoS)
C
Spoofing
D
Man-in-the-Middle (MitM)
Answer:
Question : 5 What is the term for an attack that involves intercepting and altering communication between two parties without their knowledge?
A
Phishing
B
Spoofing
C
Man-in-the-Middle (MitM)
D
Denial of Service (DoS)
Answer:
Question : 6 Which of the following is NOT a phase of ethical hacking?
A
Reconnaissance
B
Exploitation
C
Post-Attack
D
Attack
Answer:
Question : 7 What is the process of tricking individuals into divulging sensitive information by pretending to be a legitimate entity?
A
Hacking
B
Spoofing
C
Phishing
D
Denial of Service (DoS)
Answer:
Question : 8 What is the term for the practice of redirecting users from legitimate websites to fraudulent ones to steal their credentials?
A
Pharming
B
Spoofing
C
Phishing
D
Denial of Service (DoS)
Answer:
Question : 9 Which type of attack involves modifying DNS records to redirect users to fake websites?
A
Pharming
B
Phishing
C
Spoofing
D
Man-in-the-Middle (MitM)
Answer:
Question : 10 What is the term for an attack that involves exploiting vulnerabilities in software to gain unauthorized access?
A
Phishing
B
Exploit
C
Spoofing
D
Denial of Service (DoS)
Answer:
Question : 11 Which term refers to an attack that involves using one compromised system to attack other systems within the same network?
A
Phishing
B
Spoofing
C
Pivoting
D
Denial of Service (DoS)
Answer:
Question : 12 Which of the following is NOT considered a social engineering technique?
A
Phishing
B
Shoulder Surfing
C
SQL Injection
D
Tailgating
Answer:
Question : 13 What is the term for an attack that involves capturing and analyzing network traffic to gather sensitive information?
A
Phishing
B
Spoofing
C
Sniffing
D
Denial of Service (DoS)
Answer:
Question : 14 Which of the following is NOT a common cryptography attack?
A
Brute Force
B
Social Engineering
C
Man-in-the-Middle (MitM)
D
Cryptanalysis
Answer:
Question : 15 Which term refers to an attack that involves overwhelming a system by sending more data than it can handle?
A
Phishing
B
Spoofing
C
Buffer Overflow
D
Denial of Service (DoS)