Documente Academic
Documente Profesional
Documente Cultură
A. Phone Phreaking
B. Phone Traking
C. Phone Networking
D. None of the above
ANSWER A
:
Q.4 Someone who maliciously breaks into systems for personal gain.
A. Hacker
B. Cracker
C. Unauthorized Person
D. None of the above
ANSWER A
:
Q.5 A hacker who gains access to systems with a view to fix the identified weaknesses?
A. Black hat hackers
B. White hat hackers
C. Grey Hat Hackers
D. Script kiddles
ANSWER B
:
Q.6 A hacker who gains access to computer systems for personal gain?
A. Black hat hackers
B. White hat hackers
C. Grey Hat Hackers
D. Script kiddles
ANSWER A
:
Q.7 Identifying weakness in computer systems or network to exploit its weaknesses to gain
access?
A. Hacking
B. Cracking
C. Tracking
D. None of the above
ANSWER A
:
Q.10 A non skilled person who gains access to computer systems using already made tools.
A. Black hat hackers
B. White hat hackers
C. Grey Hat Hackers
D. Script kiddles
ANSWER D
:
Q.11 A hacker who use hacking to send social, religious, and political etc messages.
A. Black hat hackers
B. Hacktivist
C. Grey Hat Hackers
D. Script kiddles
ANSWER B
:
Q.12 A hacker who identifies and exploits weaknesses in telephones instead of computers.
A. Phreaker
B. Hacktivist
C. Grey Hat Hackers
D. Script kiddles
ANSWER A
:
Q.24 It is a robust ethical hacking tool which can help users to recover lost passwords.
A. Netsparker
B. Acunetix
C. saferVPN
D. Hashcat
ANSWER D
:
Q.25 It is one of the best online brute-force ,speedy, parallel password crackers ethical hacking
tool.
A. Medusa
B. Acunetix
C. saferVPN
D. Hashcat
ANSWER A
:
Q.33 Exceeding the scope of a warrant is not likely to affect the admissibility of the evidence
collected.
A. True
B. False
ANSWER B
:
Q.37 When a hacker attempts to attack a host via the internet it is known as what type of
attack?
A. Local access
B. Remote attack
C. Internal attack
D. Physical access
ANSWER B
:
Q.49 A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
ANSWER C
:
Q.50 What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
ANSWER D
:
Q.51 The security, functionality, and ease of use triangle illustrates which concept?
A. As security increases, functionality and ease of use increase.
B. As security decreases, functionality and ease of use increase.
C. As security decreases, functionality and ease of use decrease.
D. Security does not affect functionality and ease of use.
ANSWER B
:
Q.52 Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hacker
D. Script kiddies
ANSWER A
:
Q.55 When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
ANSWER A
:
Q.60 Which are good sources of information about a company or its employees?
A. Newsgroups
B. Job postings
C. Company website
D. All of the above
ANSWER D
:
Q.63 Nslookup can be used to gather information regarding which of the following?
A. Host names and IP addresses
B. Whois information
C. DNS server locations
D. Name server types and operating systems
ANSWER A
:
Q.67 Which of the following is the best example of reverse social engineering?
A. A hacker pretends to be a person of authority in order to get a user to give them
information.
B. A help-desk employee pretends to be a person of authority.
C. A hacker tries to get a user to change their password.
D. A user changes their password.
ANSWER A
:
Q.68 Using pop-up windows to get a user to give out information is which type of social
engineering attack?
A. Human-based
B. Computer-based
C. Nontechnical
D. Coercive
ANSWER B
:
Q.69 What is it called when a hacker pretends to be a valid user on the system?
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
ANSWER A
:
Q.71 Faking a website for the purpose of getting a user’s password and username is which type
of social engineering attack?
A. Human-based
B. Computer-based
C. Web-based
D. User-based
ANSWER B
:
Q.72 Dumpster diving can be considered which type of social engineering attack?
A. Human-based
B. Computer-based
C. Physical access
D. Paper-based
ANSWER A
:
Q.76 What is the preferred communications method used with systems on a bot-net?
A. ICMP
B. E-mail
C. IRC
D. TFTP
ANSWER C
:
Q.79 Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
ANSWER D
:
Q.80 ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
ANSWER C
:
Q.81 Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
ANSWER A
:
Q.82 _____________ is the technique used in business organizations and firms to protect IT
assets.
A. Ethical hacking
B. Unethical hacking
C. Fixing bugs
D. Internal data-breach
ANSWER A
:
Q.83 The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
ANSWER B
:
Q.84 An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
A. True
B. False
ANSWER A
:
Q.85 After performing ____________ the ethical hacker should never disclose client
information to other parties.
A. hacking
B. cracking
C. penetration testing
D. exploiting
ANSWER C
:
Q.86 __________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
A. Social ethics
B. Ethics in cyber-security
C. Corporate ethics
D. Ethics in black hat hacking
ANSWER D
:
Q.87 ________ helps to classify arguments and situations, better understand a cyber-crime and
helps to determine appropriate actions.
A. Cyber-ethics
B. Social ethics
C. Cyber-bullying
D. Corporate behavior
ANSWER A
:
Q.88 A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
ANSWER A
:
Q.91 What is the one thing that old hackers were fond of or find interests in?
A. Breaking Other’s system
B. Voracious thirst for knowledge
C. Cracking Phone calls
D. Learning new language
ANSWER B
:
Q.92 In which year the first popular hacker conference took place?
A. 1994
B. 1995
C. 1993
D. 1992
ANSWER C
:
Q.94 _______ is the oldest phone hacking techniques used by hackers to make free calls
A. Phishing
B. Spamming
C. Phreaking
D. Cracking
ANSWER C
:
Q.95 In which year, hacking became a practical crime and a matter of concern in the field of
technology?
A. 1971
B. 1973
C. 1970
D. 1974
ANSWER C
:
Q.96 Who was the first individual who performed a major hacking in the year 1971?
A. Steve Wozniak
B. Steve Jobs
C. Kevin Mitnick
D. John Draper
ANSWER D
:
Q.98 _____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
A. PGP (Protected Good Privacy)
B. AES (Advanced Encryption Standard)
C. PGP (Pretty Good Privacy)
D. DES (Data Encryption Standard)
ANSWER C
:
Q.99 Name the hacker who breaks the ARPANET systems?
A. Jon von Neumann
B. Kevin Poulsen
C. Kevin Mitnick
D. John Draper
ANSWER B
:
Q.100 In which year computer scientists try to integrate encryption techniques in TCP/IP
protocol?
A. 1978
B. 1980
C. 1982
D. 1984
ANSWER A
: