0% found this document useful (0 votes)
90 views5 pages

QB ClassTest2

The document contains a series of multiple-choice questions related to ethical hacking, digital forensics, and cybersecurity concepts. It covers topics such as tools for ethical hacking, the ethics of hacking, vulnerabilities, and legal considerations in cybersecurity practices. Each question is followed by answer options, with some questions providing explanations for the correct answers.

Uploaded by

gavalimanasi1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views5 pages

QB ClassTest2

The document contains a series of multiple-choice questions related to ethical hacking, digital forensics, and cybersecurity concepts. It covers topics such as tools for ethical hacking, the ethics of hacking, vulnerabilities, and legal considerations in cybersecurity practices. Each question is followed by answer options, with some questions providing explanations for the correct answers.

Uploaded by

gavalimanasi1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

_________ is a tool for Ethical hacking web application


A) Netsparker B) Bursuite
C) Angry IP Scanner D) GFI LanGuard
2. __________ Norms should not satisfy by Investigator.
A) To be honest and Trustworthy
B) Avoid harm to others
C) To declare any confidential matters or knowledge
D) To respect privacy of others
3. Use Port for scanning is
A) Scanning network to check who is there
B) Identify network to check who is there
C) Scanning network who is not there
D) None
4. A procedure to find the digital evidence is called_______
A) Investigation B) Process
C)Authentication D) All of these
5. The first Block of Block chain is Called as ______
A) Genesis Block B) Transaction Block
C) Hash Block D) Famous Block
6. The theory of mechanization was developed by________
A) Bertland Russel B) Turing
C) Aristotle D) Charles Babbage
7. ________ is a data- centric middle ware standard for device-to-device or machine to machine
communication
A) Web Socket B) Data Distribution Service
C) Constrained Application Protocol D) None of these
8. A Hacker who identifies and exploits weaknesses in telephone instead of computer is
A) Script kiddies B) Hacktivist
C) Phreaker D) Cracker

9. In_________ multiple large messages can quickly fill total storage capacity of an email server
A) Storage overload B) Bandwidth blocking
C) A and B D) none
10. In moblie communication,4G includes _______
A) LTE B) UMTS
C) CDMA D) CDMA2000
11. How many phases in Road map for digital forensic research
A) 5 B) 6
C) 4 D) 7
12. __________ is a tool for ethical hacking web application
A) Netsparker B) Bursuit
C) Angry IP Scanner D) GFI LanGuard
13. SNMP stands for ________
A) Single Network Management Protocol
B) Simple Network Mobile Protocol
C) Simple Network Management Protocol
D) None
14. What is the primary goal of Ethical Hacker?
A) Avoid Detection B) Hacking
C) Find Security Weakness D) Testing
15. What is the ethics behind training how to hack a system?
A)To think like hackers and know how to defend such attacks
B)To hack a system without the permission
C)To hack a network that is vulnerable
D) To corrupt software or service using malware
16. If a security audit is conducted by network administrator on internal network then it is known
as______
A) Security Testing B) Gray Box Testing
C) Black Box Testing D) White Box Testing
17. Having a member of the search team trained to handle digital evidence.
A) Can Reduce the number of people who handle the evidence
B) Can help in the presentation of the case
C) Can help in the Integrity of the evidence
D) All of these
18. Vulnerability is nothing but
A) Weakness of a system B) Strong point of a system
C) Both A) and B) D) None
19. Piggybacking onto a network through an insecure wireless configuration is a _________
A) Default windows OS Configuration
B) Weak SQL server administrator password
C) Operating system attack
D) Network Infrastructure Attack
20. __________ and _________ supports methods such as GET,PUT,POST and DELETE
A) HTTP, CoAP B) Websocket, MQTT
C) XMPP, AMQP D) NONE

21. In mobile communication,4G includes _______


A) LTE B) UMTS
C) CDMA D) CDMA2000
22. Block chain 2,0 is born in the year _______
A) 2009 B) 2014
C) 2017 D) 2018
23. The first Block of Block chain is Called as ______
A) Genesis Block B) Transaction Block
C) Hash Block D) Famous Block
24. Which of the following term suit more to White Hat Hackers?
A)Formar Black Hat B) Formar Gray Hat
C) Fame Gainer D) Security Professional
25. Web server provide__________ as security mechanism
A) ACL B) Root directory
C) Both A and b D)none
26. Illustarative evidenceis also called________
A) Demostrative Evidence B) Explainable Eviodence
C) Substantial Evidence D) Documented Evidence
27. Which of the Following is not a computer networking device
A) Router B) Firewall
C) Generic Host D) None
28. 802.15.4 also called as
A) Ethernet B) Wifi
C) WiMax D) LR-WPAN
29. In EMCI model, ______ is the phase during which crime is reported to some authority
A) Awareness B) Planning
C) Storage D) Collection
30. IIEEE 802.11 is collection of wireless loacal area network(WLAN) communication standards
,including extensive description of the --------
A) Link Layer B) Application Layer
C) Transport Layer D)Network Layer
31. WAF stands for _________
A) Web Application Firewall B) Wireless Application Firewall
C) Wired Application Firewall D) Wide Application Firewall
32. What is the primary goal of Ethical Hacker?
A) Avoid Detection B) Hacking
C) Find Security Weakness D) Testing
33. __________ is a tool for ethical hacking web application
A) Netsparker B) Bursuit
C) Angry IP Scanner D) GFI LanGuard
34. SNMP stands for ________
A) Single Network Management Protocol
B) Simple Network Mobile Protocol
C) Simple Network Management Protocol
D) None
35. Unix is----------------------
A) Uniplexed Information And computing services
B) Unique information and computing services
C) User Information and computing services
D) Universal Information and computing service
36. ________ belong to Email Attack
A) Email Bomd B) Banner
C) Both A) and B) D) None
37. ________ form the basis of various applications.
A) Algorithms B) Programms
C) Code D) Testing

38. Vulnerability is nothing but


A) Weakness of a system B) Strong point of a system
C) Both A) and B) D) None
39. Piggybacking onto a network through an insecure wireless configuration is a _________
A) Default windows OS Configuration
B) Weak SQL server administrator password
C) Operating system attack
D) Network Infrastructure Attack
40. __________ and _________ supports methods such as GET,PUT,POST and DELETE
A) HTTP , CoAP B) Websocket, MQTT
C) XMPP ,AMQP D) NONE 75.

41. What is the ethics behind training how to hack a system?


a)To think like hackers and know how to defend such attacks
b)To hack a system without the permission
c)To hack a network that is vulnerable
d)To corrupt software or service using malware
Answer: a Explanation: It is important for ethical hackers and security professional to
know how the cyber-criminals think and proceed to target any system or network. This is why
ethical hackers and penetration testers are trained with proper ethics to simulate such a
scenario as how the real cyber-attack takes place.
42. Performing a shoulder surfing in order to check other’s password isethical practice.
a)a good
b)not so good
c)very good social engineering practice
d)a bad
Answer: d Explanation: Overlooking or peeping into someone‟s system when he/she is
entering his/her password is a bad practice and is against the ethics of conduct for every
individual. Shoulder surfing is a social engineering attack approach used by some cyber-
criminals to know your password and gain access to your system later.
43. has now evolved to be one of the most popular automated tools for unethical hacking.
a)Automated apps
b)Database software
c)Malware
d)Worms
Answer: c Explanation: Malware is one of the biggest culprits that harm companies because
they are programmed to do the malicious task automatically and help hackers do illicit
activities with sophistication.
44. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
a) True
b) False
Answer: a Explanation: Without prior permission of the senior authority or any senior
member, if you‟re leaking or taking our your company‟s data outside (and which is
confidential), then it‟s against the code of corporate ethics.
45. is the technique used in business organizations and firms to protect IT assets.
a)Ethical hacking
b)Unethical hacking
c)Fixing bugs
d)Internal data-breach
Answer: a Explanation: Ethical hacking is that used by business organizations and firms for
exploiting vulnerabilities to secure the firm. Ethical hackers help in increasing the capabilities
of any organization or firm in protecting their IT and information assets.

46. The legal risks of ethical hacking include lawsuits due to of personal data.
a)stealing
b)disclosure
c)deleting
d)hacking
Answer: b Explanation: The legal risks of ethical hacking contains lawsuits due to disclosure
of personal data during the penetration testing phase. Such disclosure of confidential data may
lead to a legal fight between the ethical hacker and the organization.

47. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
a)Know the nature of the organization
b)Characteristics of work done in the firm
c)System and network
d)Type of broadband company used by the firm
Answer: d Explanation: Before performing any penetration test, through the legal procedure
the key points that the penetration tester must keep in mind are –
i) Know the nature of the organization ii) what type of work the organization do and
iii) the system and networks used in various departments and their confidential data that are
sent and received over the network.

48. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a)True
b)False
Answer: a
Explanation: Yes, it is very important for an ethical hacker to make sure that while doing
penetration tests, the confidential data and proprietary information are preserved properly and
not get leaked to the external network.

49. After performing the ethical hacker should never disclose client information to other
parties.
a)hacking
b)cracking
c)penetration testing
d)exploiting
Answer: c Explanation: It is against the laws and ethics of ethical hackers that after doing
penetration tests, the ethical hacker should never disclose client information to other parties.
The protection of client data is in the hands of the ethical hacker who performed the tests.

50. is the branch of cyber security that deals with morality and provides different theories and a
principle regarding the view-points about what is right and wrong.
a)Social ethics
b)Ethics in cyber-security
c)Corporate ethics
d)Ethics in black hat hacking
Answer: d Explanation: Ethics in cyber-security is the branch of cyber security that deals
with morality and provides different theories and principles‟ regarding the view-points about
what is right and what need not to be done.

You might also like