Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Ethical Hacking MCQs

#1. What is the purpose of a Certificate Authority (CA) in the context of network security?

#2. What is a common technique used to protect against SQL injection attacks?

#3. What is the main purpose of a Proxy Server in network security?

#4. Which encryption protocol is commonly used to secure web traffic?

#5. In ethical hacking, what is the purpose of a Man-in-the-Middle (MitM) attack?

#6. What is the main purpose of a Intrusion Detection System (IDS) in network security?

#7. Which type of encryption uses a single key for both encryption and decryption?

#8. What is the main goal of a social engineering attack in ethical hacking?

#9. What is the purpose of a honeynet in network security?

#10. What is the primary objective of a Red Team in ethical hacking?

#11. What is the purpose of a firewall in network security?

#12. Which of the following is an example of social engineering attack?

#13. What is the difference between a vulnerability and an exploit in ethical hacking?

#14. What is the purpose of a virtual private network (VPN) in ethical hacking?

#15. In ethical hacking, what is the term "payload" typically associated with?

#16. What is the main goal of a DDoS (Distributed Denial of Service) attack?

#17. What is a common method of protecting sensitive information during transmission over a network?

#18. What does the term "phreaking" refer to in the context of hacking?

#19. What is the purpose of a DNS (Domain Name System) in network communication?

#20. What is the primary goal of conducting a security assessment in ethical hacking?

Results

Categories MCQ