Ethical Hacking - Study24x7
Social learning Network
ethicalhacking1 Cover image
ethicalhacking1
Ethical Hacking
  • Followers
  • Latest Feeds
  • Articles
  • Question
  • Course
  • About
  • Review
Interests
Computer Science
4 followers study24x7 24 Dec 2024 12:11 PM study24x7 study24x7

What is ARP spoofing?

A

Deleting ARP tables

B

Poisoning ARP cache to redirect traffic

C

Encrypting ARP requests

D

Preventing ARP resolutions

study24x7
Write a comment
4 followers study24x7 23 Dec 2024 11:32 AM study24x7 study24x7

What is an ethical hacker also known as?

A

Black hat hacker

B

White hat hacker

C

Gray hat hacker

D

Script kiddie

study24x7
Write a comment
4 followers study24x7 23 Dec 2024 11:05 AM study24x7 study24x7

Which cryptographic technique is commonly used in SSL/TLS?

A

Asymmetric encryption

B

Hashing

C

Symmetric encryption

D

Steganography

study24x7
Write a comment
4 followers study24x7 23 Dec 2024 11:04 AM study24x7 study24x7

What does SSH stand for?

A

Secured Server Hacking

B

Secure Shell

C

System Security Host

D

Secure Socket Hosting

study24x7
Write a comment
4 followers study24x7 23 Dec 2024 10:49 AM study24x7 study24x7

What is a botnet?

A

A type of encryption algorithm

B

A network of infected devices

C

A penetration testing tool

D

A VPN

study24x7
Write a comment
4 followers study24x7 20 Dec 2024 10:23 AM study24x7 study24x7

Which attack exploits software vulnerabilities to inject malicious scripts?

A

Man-in-the-Middle

B

SQL Injection

C

XSS (Cross-Site Scripting)

D

Phishing

study24x7
Write a comment
4 followers study24x7 20 Dec 2024 10:22 AM study24x7 study24x7

What is hash cracking?

A

Cracking network protocols

B

Decrypting hashed passwords

C

Encrypting passwords

D

Creating viruses

study24x7
Write a comment
4 followers study24x7 20 Dec 2024 10:22 AM study24x7 study24x7

Which of these is a vulnerability scanning tool?

A

Nessus

B

Metasploit

C

Wireshark

D

Netcat

study24x7
Write a comment
4 followers study24x7 19 Dec 2024 12:37 PM study24x7 study24x7

What is the main purpose of a firewall?

A

Encrypt data

B

Block unauthorized access

C

Perform network penetration testing

D

Create malware

study24x7
Write a comment
4 followers study24x7 19 Dec 2024 12:37 PM study24x7 study24x7

Which one is an example of social engineering?

A

Malware injection

B

Phishing emails

C

Port scanning

D

Vulnerability scanning

study24x7
Write a comment
4 followers study24x7 19 Dec 2024 12:36 PM study24x7 study24x7

National Income and Related Aggregates

A

Attack using unpatched vulnerabilities

B

An outdated attack

C

A denial-of-service attack

D

A firewall bypass

study24x7
Write a comment
4 followers study24x7 18 Dec 2024 11:26 AM study24x7 study24x7

What is steganography?

A

Hiding malicious software

B

Hiding information within files or images

C

Encrypting passwords

D

Scanning networks

study24x7
Write a comment
4 followers study24x7 18 Dec 2024 11:26 AM study24x7 study24x7

What is brute force attack?

A

Social engineering

B

Guessing passwords systematically

C

Encrypting data

D

Sending spam emails

study24x7
Write a comment
4 followers study24x7 18 Dec 2024 11:25 AM study24x7 study24x7

Which tool is used for packet sniffing?

A

Hydra

B

Wireshark

C

SQLmap

D

John the Ripper

study24x7
Write a comment
4 followers study24x7 17 Dec 2024 10:10 AM study24x7 study24x7

What is the main purpose of penetration testing?

A

Destroy networks

B

Test system vulnerabilities

C

Develop malware

D

Steal information

study24x7
Write a comment
4 followers study24x7 17 Dec 2024 10:09 AM study24x7 study24x7

What type of attack is Cross-Site Scripting (XSS)?

A

SQL-based attack

B

Client-side code injection

C

Phishing

D

Network interception

study24x7
Write a comment
4 followers study24x7 17 Dec 2024 10:09 AM study24x7 study24x7

What is phishing?

A

Stealing user credentials via fake websites

B

Searching for open ports

C

Cracking passwords

D

Network scanning

study24x7
Write a comment
4 followers study24x7 16 Dec 2024 11:05 AM study24x7 study24x7

Which protocol is commonly targeted during a Man-in-the-Middle (MITM) attack?

A

HTTP

B

FTP

C

SMTP

D

HTTPS

study24x7
Write a comment
4 followers study24x7 16 Dec 2024 10:49 AM study24x7 study24x7

What is the primary goal of reconnaissance?

A

Disabling firewalls

B

Gathering information

C

Exploiting systems

D

Deleting logs

study24x7
Write a comment
4 followers study24x7 16 Dec 2024 10:48 AM study24x7 study24x7

What is a Trojan Horse in cybersecurity?

A

A virus

B

A phishing attack

C

A type of malware disguised as legitimate software

D

A firewall

study24x7
Write a comment
Ratings
0.0
out of 5
0 Ratings
5 study24x7
 
0.0
4 study24x7
 
0.0
3 study24x7
 
0.0
2 study24x7
 
0.0
1 study24x7
 
0.0
Related Pages