• Ethical Hacking MCQs [18]

    1) Which of the following is/are true for LSB insertion steganography technique? a. The original media file can be exactly recovered at the receiving end.b. It is vulnerable to media manipulation attacks.c. One of more least significant bits of each element in the media file are used for hiding information.d. All of these. Answer: b, […]

    Continue Reading

  • Ethical Hacking MCQs [17]

    1) Some common characteristics of network-based attacks are: a. They rely on powerful server machines.b. They exploit some weaknesses in some network protocols.c. They exploit some weaknesses in system configurations.d. All of these. Answer: b, c Solution: Network-based attacks do not necessarily require powerful machines, and hence option (a) is not true. These attacks try […]

    Continue Reading

  • Ethical Hacking MCQs [16]

    1) With respect to hash function, what is meant by collision? a. Two different messages M1 and M2 may generate the same hash value H.b. The same message M may generate two different hash values H1 and H2.c. The original message M can be recovered from the hash value H by applying aninverse function.d. None […]

    Continue Reading

  • Ethical Hacking MCQs [15]

    1) What is the meaning of one-way function? a. It can be used by the sender but not by the receiver.b. It can be used by the receiver but not by the sender.c. It implements a many-to-one mapping.d. It implements a one-to-many mapping. Answer: c Solution: Hashing is a type of one-way function, which refers […]

    Continue Reading

  • Ethical Hacking MCQs [14]

    1) 10 parties want to exchange messages securely using some symmetric key encryption technique like AES. The number of distinct key values required will be __ Answer: 45 Solution: In symmetric encryption, every pair of communicating parties must have a separate key. For N parties, the number of keys will be NC2. For N = […]

    Continue Reading

  • Ethical Hacking MCQs [13]

    1) What is meant by authentication? a. Ensuring confidentiality of data.b. Verifying the identity of the sender.c. Digitally signing of a document.d. None of these. Answer: b Solution: Authentication refers to the process of verifying the identity of the sender of a message. Hence, the correct option is (b). 2) Consider a mono-alphabetic cipher with […]

    Continue Reading

  • Ethical Hacking MCQs [12]

    1) Which of the following Linux distributions are suited for penetration testing? A. BacktrackB. TrapdoorC. KaliD. All of these Answer: A, C Solution: Both Backtrack and Kali are Linux distributions, containing a set of tools using which, one can test networks, devices and systems for vulnerability. Backtrack is an old distribution, based on Ubuntu; whereas […]

    Continue Reading

  • Ethical Hacking MCQs [11]

    1) Which of the following provide complete set of tools for vulnerability assessment? A. NexposeB. NessusC. PentestD. All of these Answer: A, B Solution: Nexpose is a popular vulnerability assessment tool that aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation.Nessus is an open-source vulnerability […]

    Continue Reading

  • Ethical Hacking MCQs [10]

    1) What results will the following command yield: ‘nmap -sS -O -p 123-153 192.168.100.3’? a. A stealth scan, opening port 123 and 153b. A stealth scan, checking open ports 123 to 153c. A stealth scan, checking all open ports excluding ports 123 to 153d. A stealth scan, determine operating system, and scanning ports 123 to […]

    Continue Reading

  • Ethical Hacking MCQs [9]

    1) Which of the following open source tools would be the best choice to scan a network for potential targets? a. NMAPb. NIKTOc. CAINd. John the Ripper Answer: a Solution: NMAP is a port scanning tool and can be used to scan a network for potential targets. NIKTO is a web site vulnerability scanner that […]

    Continue Reading