Ethical Hacking Multiple Choice Question

Question : 1 What is the primary goal of ethical hacking?

  • A

    To exploit vulnerabilities for personal gain

  • B

    To penetrate networks without permission

  • C

    To identify and fix security vulnerabilities

  • D

    To cause harm to computer systems

Answer:

Question : 2 Which term refers to a program or script that automates the process of finding security vulnerabilities?

  • A

    Malware

  • B

    Virus

  • C

    Exploit

  • D

    Security Scanner

Answer:

Question : 3 What is the practice of gathering information about a target system without directly interacting with it?

  • A

    Hacking

  • B

    Footprinting

  • C

    Phishing

  • D

    Spoofing

Answer:

Question : 4 Which type of attack involves flooding a network or system with excessive traffic to make it unavailable to users?

  • A

    Phishing

  • B

    Denial of Service (DoS)

  • C

    Spoofing

  • D

    Man-in-the-Middle (MitM)

Answer:

Question : 5 What is the term for an attack that involves intercepting and altering communication between two parties without their knowledge?

  • A

    Phishing

  • B

    Spoofing

  • C

    Man-in-the-Middle (MitM)

  • D

    Denial of Service (DoS)

Answer:

Question : 6 Which of the following is NOT a phase of ethical hacking?

  • A

    Reconnaissance

  • B

    Exploitation

  • C

    Post-Attack

  • D

    Attack

Answer:

Question : 7 What is the process of tricking individuals into divulging sensitive information by pretending to be a legitimate entity?

  • A

    Hacking

  • B

    Spoofing

  • C

    Phishing

  • D

    Denial of Service (DoS)

Answer:

Question : 8 What is the term for the practice of redirecting users from legitimate websites to fraudulent ones to steal their credentials?

  • A

    Pharming

  • B

    Spoofing

  • C

    Phishing

  • D

    Denial of Service (DoS)

Answer:

Question : 9 Which type of attack involves modifying DNS records to redirect users to fake websites?

  • A

    Pharming

  • B

    Phishing

  • C

    Spoofing

  • D

    Man-in-the-Middle (MitM)

Answer:

Question : 10 What is the term for an attack that involves exploiting vulnerabilities in software to gain unauthorized access?

  • A

    Phishing

  • B

    Exploit

  • C

    Spoofing

  • D

    Denial of Service (DoS)

Answer:

Question : 11 Which term refers to an attack that involves using one compromised system to attack other systems within the same network?

  • A

    Phishing

  • B

    Spoofing

  • C

    Pivoting

  • D

    Denial of Service (DoS)

Answer:

Question : 12 Which of the following is NOT considered a social engineering technique?

  • A

    Phishing

  • B

    Shoulder Surfing

  • C

    SQL Injection

  • D

    Tailgating

Answer:

Question : 13 What is the term for an attack that involves capturing and analyzing network traffic to gather sensitive information?

  • A

    Phishing

  • B

    Spoofing

  • C

    Sniffing

  • D

    Denial of Service (DoS)

Answer:

Question : 14 Which of the following is NOT a common cryptography attack?

  • A

    Brute Force

  • B

    Social Engineering

  • C

    Man-in-the-Middle (MitM)

  • D

    Cryptanalysis

Answer:

Question : 15 Which term refers to an attack that involves overwhelming a system by sending more data than it can handle?

  • A

    Phishing

  • B

    Spoofing

  • C

    Buffer Overflow

  • D

    Denial of Service (DoS)

Answer: