• Ethical Hacking MCQs [20]

    1) Which of the following attacks on hardware are invasive in nature? a. Black box testing.b. Physical probing.c. Reverse engineering.d. Side-channel analysis. Answer: b, c Solution: An invasive attack on a hardware device tampers with the device and makes some irreversible changes or damages. In black-box testing or side-channel testing, we are trying to attack […]

    Continue Reading

  • Ethical Hacking MCQs [19]

    1) Which of the following are volume-based attacks? a. UDP Floodb. HTTP Floodc. DNS cache poisoningd. All of these Answer: a, b Solution: A volume-based or volumetric attack sends a high amount of traffic or request packets to a target network/host in an effort to overwhelm its bandwidth capabilities. These attacks aim to flood the […]

    Continue Reading

  • Ethical Hacking MCQs [18]

    1) Which of the following is/are true for LSB insertion steganography technique? a. The original media file can be exactly recovered at the receiving end.b. It is vulnerable to media manipulation attacks.c. One of more least significant bits of each element in the media file are used for hiding information.d. All of these. Answer: b, […]

    Continue Reading

  • Ethical Hacking MCQs [17]

    1) Some common characteristics of network-based attacks are: a. They rely on powerful server machines.b. They exploit some weaknesses in some network protocols.c. They exploit some weaknesses in system configurations.d. All of these. Answer: b, c Solution: Network-based attacks do not necessarily require powerful machines, and hence option (a) is not true. These attacks try […]

    Continue Reading

  • Ethical Hacking MCQs [16]

    1) With respect to hash function, what is meant by collision? a. Two different messages M1 and M2 may generate the same hash value H.b. The same message M may generate two different hash values H1 and H2.c. The original message M can be recovered from the hash value H by applying aninverse function.d. None […]

    Continue Reading

  • Ethical Hacking MCQs [15]

    1) What is the meaning of one-way function? a. It can be used by the sender but not by the receiver.b. It can be used by the receiver but not by the sender.c. It implements a many-to-one mapping.d. It implements a one-to-many mapping. Answer: c Solution: Hashing is a type of one-way function, which refers […]

    Continue Reading

  • Ethical Hacking MCQs [14]

    1) 10 parties want to exchange messages securely using some symmetric key encryption technique like AES. The number of distinct key values required will be __ Answer: 45 Solution: In symmetric encryption, every pair of communicating parties must have a separate key. For N parties, the number of keys will be NC2. For N = […]

    Continue Reading

  • Ethical Hacking MCQs [13]

    1) What is meant by authentication? a. Ensuring confidentiality of data.b. Verifying the identity of the sender.c. Digitally signing of a document.d. None of these. Answer: b Solution: Authentication refers to the process of verifying the identity of the sender of a message. Hence, the correct option is (b). 2) Consider a mono-alphabetic cipher with […]

    Continue Reading

  • Ethical Hacking MCQs [12]

    1) Which of the following Linux distributions are suited for penetration testing? A. BacktrackB. TrapdoorC. KaliD. All of these Answer: A, C Solution: Both Backtrack and Kali are Linux distributions, containing a set of tools using which, one can test networks, devices and systems for vulnerability. Backtrack is an old distribution, based on Ubuntu; whereas […]

    Continue Reading

  • Ethical Hacking MCQs [11]

    1) Which of the following provide complete set of tools for vulnerability assessment? A. NexposeB. NessusC. PentestD. All of these Answer: A, B Solution: Nexpose is a popular vulnerability assessment tool that aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation.Nessus is an open-source vulnerability […]

    Continue Reading