These Ethical Hacking multiple-choice questions and their answers will help you strengthen your grip on the subject of Ethical Hacking. You can prepare for an upcoming exam or job interview with these 90+ Ethical Hacking MCQs.
So scroll down and start answering.
A. It infects the target application and alters it.
B. it alters the infected program into a subroutine. which runs after the virus has itself run.
C. Multipartite virus
D. Logic bomb
E. Cryptovirus
F. Shell virus
Which of the following statements is/are correct about stealth scan or half-Open scan?
i) With stealth scan, the chances of triggering the detection mechanism are high.
ii) Stealth scan is less reliable as compared to full-Open scan.
A.
Only statement i) is correct.
B.
Only statement ii) is correct. Â
C.
Both statements i) and ii) are correct.
D.
Neither statement i) nor ii) is correct.
Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?
A.
nmap —sP -PE
B.
nmap —sP —PE —PA
C.
nmap —sP —PE
D.
nmap —sP —PA
A. Reconnaissance
B. Sniff‌ing
C. Fingerprinting
D. None of the above.
A. In relation to switched network sniff‌ing, which of the following options is represented by a switchport?
B. Broadcast domain
C. Windows domain
D. Secure domain
A. SYN
B. Teardrop
C. Targa3
D. UDP
A. $iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
B. $iptables OUTPUT -p icmp —icmp-type —e echo-request -i DROP
C. $iptables OUTPUT-A -p icmp «icmp-type echo-request -e DROP
D. $iptables —O -A OUTPUT -p icmp «icmp-type echo-request ~j DROP
A. Shift+ Tab
B. Ctrl + Tab
C. Alt + Tab
D. Ctrl + Alt + Del
A. $nmap -sT 443 —p abcExample.com
B. $nmap —O -sT -p 443 abcExample.com
C. $nmap -O -p 443 abcExample.com
D. $nmap -sT -p 443 abcExample.com
Which of the following commands is used for performing a Xmas tree scan with Nmap?
A.
NMAP —sX —v
B.
NMAP -xS —p
C.
NMAP —sX
D.
NMAP —X
A. Set
B. info
C. Use
D. Show
While using the Netcap tool, which of the following commands is used for performing port scanning?
A.
nc —v -p lPaddress
B.
nc -v —2 -W1 lPaddress
C.
nc —n -v -I -w1 IPaddress
D.
nc -n -z -I IPaddress -p
A. -n
B. —T5
C. -o
D. -A
A. PDFTK
B. Origami framework
C. Neither option a nor b.
A. Traditional Brute Force
B. Dictionary Attacks
C. Hybrid Attacks
D. None of the above.
A. We can overwrite a variable, which is local and near to the buffer in the main memory on the stack and can change the behavior of the program.
B. We can overwrite a function pointer.
C. We can overwrite the return address in the stack frame.
D. All of the above.
A. cat password.txt
B. list password.txt
C. display password.txt
D. Is password.txt
A. no -a -i -m —p 80
B. nc -n -I 80 -p
C. nc -n -v -| -p 80
D. nc -n -l -v -ip 80
A. $nmap -0 -d abcExample.com
B. $nmap -0 -v abcExample.com
C. $nmap -W -v abcExample.com
D. $nmap -W -d abcExample.com
Using Nmap, which Of the following is the correct syntax for performing a ping to a remote Windows or Linux Operating system?
A.
NMAP —ping —sP
B.
NMAP target IP address>Â
C.
NMAP —sP —v
D.
NMAP ping —v
A. FIN scan
B. NULL scan
C. ACK scan
D. Xmas tree scan
Which of the following options is a Linux/Unix sniff‌ing tool that is designed for graphically displaying a system's incoming and outgoing connections?
A. Dsniff
B. EtherApe
C. Windump
D. Wireshark
A. Terminator
B. Random
C. Random XOR
D. Logical
Identify the type of denial-of—service (DOS) attack from the following statement
This attack queues up the packets that have bad source IP; uses memory and resources; and eventually hangs, reboots or crashes the system
A.
TeardropÂ
B.
SYN attack
C.
Smurf attack
D.
None of the above.
A.
Only options i) and ii).
B.
Only options ii) and iii).
C.
Only options i) and iii).
D.
All options i), ii) and iii).
A. Ciphertext-only Attack
B. Chosen Ciphertext Attack
C. Known Plaintext Attack
D. None of the above.
A. man
B. cd..
C. w
D. vi
A. nc 8080 —lvp
B. nc —lvp 80
C. nc —l 80
D. nc —p -le 8080
A. Shrink Wrap Code
B. Phishing
C. Phreaker
D. Rootkit
A. AirSnare
B. AirSnort
C. Kismet
D. ToneLoc
A. 0x80
B. 0x88
C. 0x90
D. 0x95
A. ICMP
B. IGMP
C. WTLS
D. 3DES
A. It is a hidden entry to a computing device that bypasses security measures.
B. It is the process of writing large amount of data to the memory, than the buffer memory is allocated to hold.
C. It is a group of computers that is controlled without the knowledge of their owners.
D. It is a type of denial-of—service attack.
A. pwd
B. passwd
C. cd
D. p
A. Data-link layer
B. Presentation layer
C. Application layer
D. Transport layer
A. capinfos
B. tshark
C. editcap
D. dumpcap
A. Authentication Header
B. Cipher Text
C. Secure Hash Algorithm
D. Encapsulating Security Payload
A. Visual Basic
B. Perl
C. Java
D. c
A. 443
B. 8080
C. 23
D. 2513
A. root@root: mysql —h
B. roottf‌iiroot: mysql
C. root@root: -—h mysql —u root -—p
D. root@root; -u mysql —h
During fingerprinting, which Of the following elements are analyzed for determining the operating system?
i)Don‘t fragment bit
ii)Window size
iii)Time-to-live on the outbound packet
iv)Type of service
A.
Only Options i) and iii).Â
B.
Only Options ii) and iii).
C.
Only options i), iii) and iv).
D.
All Options i), ii), iii) and iv).
A. |
B. s
C. u
D. i
A. Unix
B. Windows NT
C. Mac 0S
D. All of the above.
E. None of the above
A. nmap —mtu 32
B. nmap 32
C. nmap —mtu -g «32
D. nmap 32—mtu
A. locate
B. netstat
C. cat
D. nslookup
A. Netstat
B. TCPView
C. RECUB
D. None of the above
A. /proc
B. /sbin
C. /root
D. /lib
A. netstat —an
B. netstat —st
C. netstat —sp
D. netstat —a
A. ping
B. fping
C. nslookup
D. nmap
Which of the following are sniffing tools?
i) Wireshark
ii) Cain and Abel
iii) Dsniff
iv) Ettercap
v) Tcpdump
A.
Only options i). iii) and iv)
B.
Only options ii). iii). iv) and v)
C.
Only options i), ii) and v)
D.
All of the above
E.
None of the above