Ethical Hacking MCQs [14]

1) 10 parties want to exchange messages securely using some symmetric key encryption technique like AES. The number of distinct key values required will be __ Answer: 45 Solution: In symmetric encryption, every pair of communicating parties must have a separate key. For N parties, the number of keys will be NC2. For N =... Continue Reading →

Ethical Hacking MCQs [13]

1) What is meant by authentication? a. Ensuring confidentiality of data.b. Verifying the identity of the sender.c. Digitally signing of a document.d. None of these. Answer: b Solution: Authentication refers to the process of verifying the identity of the sender of a message. Hence, the correct option is (b). 2) Consider a mono-alphabetic cipher with... Continue Reading →

Ethical Hacking MCQs [12]

1) Which of the following Linux distributions are suited for penetration testing? A. BacktrackB. TrapdoorC. KaliD. All of these Answer: A, C Solution: Both Backtrack and Kali are Linux distributions, containing a set of tools using which, one can test networks, devices and systems for vulnerability. Backtrack is an old distribution, based on Ubuntu; whereas... Continue Reading →

Ethical Hacking MCQs [11]

1) Which of the following provide complete set of tools for vulnerability assessment? A. NexposeB. NessusC. PentestD. All of these Answer: A, B Solution: Nexpose is a popular vulnerability assessment tool that aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation.Nessus is an open-source vulnerability... Continue Reading →

Ethical Hacking MCQs [10]

1) What results will the following command yield: ‘nmap -sS -O -p 123-153 192.168.100.3’? a. A stealth scan, opening port 123 and 153b. A stealth scan, checking open ports 123 to 153c. A stealth scan, checking all open ports excluding ports 123 to 153d. A stealth scan, determine operating system, and scanning ports 123 to... Continue Reading →

Ethical Hacking MCQs [9]

1) Which of the following open source tools would be the best choice to scan a network for potential targets? a. NMAPb. NIKTOc. CAINd. John the Ripper Answer: a Solution: NMAP is a port scanning tool and can be used to scan a network for potential targets. NIKTO is a web site vulnerability scanner that... Continue Reading →

Ethical Hacking MCQs [8]

1) What command will help you to search files using Google as a search engine? a. site: target.com filetype:xls username password emailb. inurl: target.com filename:xls username password emailc. domain: target.com archive:xls username password emaild. site: target.com file:xls username password email Answer: a Solution: The “site” operator is used to limit the results for a particular... Continue Reading →

Ethical Hacking MCQs [6]

1) Which of the following corresponds to direct packet delivery option in a router? a. An incoming packet is forwarded to another router.b. An incoming packet is forwarded to the destination host present in the same network.c. An incoming packet is forwarded via the default router.d. None of these. Answer: b Solution: Direct packet delivery... Continue Reading →

Ethical Hacking MCQs [5]

1) If a packet is to be delivered to exactly one host in a network, what kind of address should be used to specify the destination? a. Unicast addressb. Broadcast addressc. Anycast addressd. None of these Answer: c Solution: Unicast address is used if a packet is to be delivered to a specific host. Broadcast... Continue Reading →

Ethical Hacking MCQs [4]

1) The maximum number of hosts that are possible in a class C network is _ Answer: 254 Solution: For a class C network, 8 bits are provided to specify the host. The all-0 and all-1 combinations cannot be used as host addresses. Therefore, the maximum number of hosts possible is 28 – 2 =... Continue Reading →

Up ↑