Ethical Hacking MCQs#1. What is the primary goal of ethical hacking? To identify and address... To identify and address... To steal sensitive information To steal sensitive information To disrupt computer networks To disrupt computer networks To test hardware performance To test hardware performance To develop new software... To develop new software... #2. Which of the following is an example of a passive reconnaissance technique used by ethical hackers? Sniffing network traffic Sniffing network traffic Launching a DDoS attack Launching a DDoS attack Exploiting a known vulnerability Exploiting a known vulnerability Social engineering Social engineering Installing a firewall Installing a firewall #3. What is the main purpose of vulnerability scanning in ethical hacking? Identifying weaknesses... Identifying weaknesses... Launching cyberattacks on... Launching cyberattacks on... Defending against phishing... Defending against phishing... Developing secure software... Developing secure software... Creating strong passwords Creating strong passwords #4. Which type of ethical hacker focuses on finding and fixing security vulnerabilities within an organization's infrastructure? White Hat Hacker White Hat Hacker Black Hat Hacker Black Hat Hacker Gray Hat Hacker Gray Hat Hacker Script Kiddie Script Kiddie Hacktivist Hacktivist #5. What is a common practice during ethical hacking to ensure the safety of the target system? Obtaining proper authorization Obtaining proper authorization Hiding the fact that you're... Hiding the fact that you're... Disabling all security measures Disabling all security measures Sharing sensitive data... Sharing sensitive data... Attacking the system... Attacking the system... Download as PDFRelated posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQs#6. Which phase of the ethical hacking process involves gathering information about the target system? Reconnaissance Reconnaissance Exploitation Exploitation Reporting Reporting Post-exploitation Post-exploitation Social engineering Social engineering #7. What does the term "zero-day vulnerability" refer to in the context of ethical hacking? A previously unknown... A previously unknown... A vulnerability that has been... A vulnerability that has been... A vulnerability that affects... A vulnerability that affects... A vulnerability exploited... A vulnerability exploited... A vulnerability with a... A vulnerability with a... #8. Which type of testing is performed to assess the security of a system without prior knowledge of its internal workings? Black Box Testing Black Box Testing White Box Testing White Box Testing Gray Box Testing Gray Box Testing Penetration Testing Penetration Testing Vulnerability Scanning Vulnerability Scanning #9. What is the primary goal of a penetration test in ethical hacking? To identify and exploit... To identify and exploit... To document system configurations To document system configurations To develop new software To develop new software To block network traffic To block network traffic To create secure passwords To create secure passwords #10. What is the purpose of a "honeypot" in ethical hacking? To attract and monitor... To attract and monitor... To store sensitive data securely To store sensitive data securely To provide training for... To provide training for... To block network traffic To block network traffic To generate strong... To generate strong... Download as PDFRelated posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQs#11. What is the purpose of a firewall in network security? To monitor and filter... To monitor and filter... To physically secure servers To physically secure servers To encrypt data in transit To encrypt data in transit To store sensitive information To store sensitive information To generate encryption keys To generate encryption keys #12. Which of the following is an example of social engineering attack? Phishing Phishing DDoS attack DDoS attack SQL injection SQL injection Cross-site scripting Cross-site scripting Firewall configuration Firewall configuration #13. What is the difference between a vulnerability and an exploit in ethical hacking? A vulnerability is a... A vulnerability is a... An exploit is a type of... An exploit is a type of... A vulnerability is an... A vulnerability is an... An exploit is a security... An exploit is a security... A vulnerability leads to... A vulnerability leads to... #14. What is the purpose of a virtual private network (VPN) in ethical hacking? To establish a secure... To establish a secure... To host websites anonymously To host websites anonymously To conduct DDoS attacks To conduct DDoS attacks To gather information To gather information To bypass firewalls To bypass firewalls #15. In ethical hacking, what is the term "payload" typically associated with? Malicious code Malicious code Secure encryption Secure encryption Network configuration Network configuration Server hardware Server hardware Data backup strategies Data backup strategies Download as PDFRelated posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQs#16. What is the main goal of a DDoS (Distributed Denial of Service) attack? To overwhelm a target... To overwhelm a target... To steal sensitive information To steal sensitive information To exploit software vulnerabilities To exploit software vulnerabilities To establish a secure... To establish a secure... To gather information To gather information #17. What is a common method of protecting sensitive information during transmission over a network? Encryption Encryption Social engineering Social engineering SQL injection SQL injection Firewall configuration Firewall configuration Biometric authentication Biometric authentication #18. What does the term "phreaking" refer to in the context of hacking? Manipulating and exploiting... Manipulating and exploiting... Hacking telephone systems Hacking telephone systems Gaining unauthorized access... Gaining unauthorized access... Exploiting software vulnerabilities Exploiting software vulnerabilities Cracking passwords Cracking passwords #19. What is the purpose of a DNS (Domain Name System) in network communication? Resolving human-readable... Resolving human-readable... Encrypting data in transit Encrypting data in transit Blocking malicious websites Blocking malicious websites Conducting vulnerability scans Conducting vulnerability scans Storing sensitive information Storing sensitive information #20. What is the primary goal of conducting a security assessment in ethical hacking? To evaluate the security... To evaluate the security... To launch cyberattacks To launch cyberattacks To identify vulnerabilities... To identify vulnerabilities... To develop new software applications To develop new software applications To perform penetration tests To perform penetration tests Download as PDFRelated posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQsNextResults Download as PDFRelated posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQs Download as PDFRelated posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQs Download as PDFShare this:Click to share on Facebook (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Related posts:Artificial Intelligence MCQSBig Data MCQsBlock Chain MCQsCloud Computing MCQs