Supercharge Your Skills with Our Annual Premium Plan! 🚀 Unlock Unlimited Access to Essential Tech Courses 📚 for Just $160 $70/Year . Subscribe Now!
Which of the following does an ethical hacker require to penetrate a system?
Correct
Incorrect
Question 2 of 155
2. Question
1 point(s)
What is Gray box Pentesting?
Correct
Incorrect
Question 3 of 155
3. Question
1 point(s)
If you have been hired to perform an attack against a target system to find and exploit
vulnerabilities, what type of hacker you are?
Correct
Incorrect
Question 4 of 155
4. Question
1 point(s)
Which of the following describes an attacker who goes after a target to draw attention
to a cause?
Correct
Incorrect
Question 5 of 155
5. Question
1 point(s)
What is the level of knowledge does a script kiddie have?
Correct
Incorrect
Question 6 of 155
6. Question
1 point(s)
A white-box test requires?
Correct
Incorrect
Question 7 of 155
7. Question
1 point(s)
Which of the following describes a hacker who attacks without regard for being
caught or punished?
Correct
Incorrect
Question 8 of 155
8. Question
1 point(s)
A penetration test is required for which of the following reason?
Correct
Incorrect
Question 9 of 155
9. Question
1 point(s)
Hacker using their skills for both benign and malicious goals at different times are?
Correct
Incorrect
Question 10 of 155
10. Question
1 point(s)
Vulnerability analysis is basically:
Correct
Incorrect
Question 11 of 155
11. Question
1 point(s)
What is Black-box testing?
Correct
Incorrect
Question 12 of 155
12. Question
1 point(s)
What does TOE stand for?
Correct
Incorrect
Question 13 of 155
13. Question
1 point(s)
The term Vulnerability refers to:
Correct
Incorrect
Question 14 of 155
14. Question
1 point(s)
What are the basic ways to perform footprinting?
Correct
Incorrect
Question 15 of 155
15. Question
1 point(s)
Which one of the following the best meaning of Footprinting?
Correct
Incorrect
Question 16 of 155
16. Question
1 point(s)
What is the purpose of Social Engineering?
Correct
Incorrect
Question 17 of 155
17. Question
1 point(s)
Which feature is used to make search more appropriate?
Correct
Incorrect
Question 18 of 155
18. Question
1 point(s)
Wayback Machine is used for
Correct
Incorrect
Question 19 of 155
19. Question
1 point(s)
Manage a Website
Correct
Incorrect
Question 20 of 155
20. Question
1 point(s)
Which record type will reveal the information about Host IP address.
Correct
Incorrect
Question 21 of 155
21. Question
1 point(s)
Which record type will reveal the information about Domain’s Mail Server (MX)
Correct
Incorrect
Question 22 of 155
22. Question
1 point(s)
Following is the most popular Web Reconnaissance framework used for information
gathering purpose as well as network detection.
Correct
Incorrect
Question 23 of 155
23. Question
1 point(s)
Which tool can be used to view web server information?
Correct
Incorrect
Question 24 of 155
24. Question
1 point(s)
To extract information regarding domain name registration, which of the following is
most appropriate?
Correct
Incorrect
Question 25 of 155
25. Question
1 point(s)
Which of the following statement below is correct?
Correct
Incorrect
Question 26 of 155
26. Question
1 point(s)
Is three-way handshaking the process of?
Correct
Incorrect
Question 27 of 155
27. Question
1 point(s)
Which of the following tool is used for Banner grabbing?
Correct
Incorrect
Question 28 of 155
28. Question
1 point(s)
SNMPv3 supports
Correct
Incorrect
Question 29 of 155
29. Question
1 point(s)
Which server anonymizes the web traffic to provide anonymity.
Correct
Incorrect
Question 30 of 155
30. Question
1 point(s)
Which of the following tool is capable of performing a customized scan?
Correct
Incorrect
Question 31 of 155
31. Question
1 point(s)
Which of the following is not a TCP Flag?
Correct
Incorrect
Question 32 of 155
32. Question
1 point(s)
Successful three-way handshaking is consisting of
Correct
Incorrect
Question 33 of 155
33. Question
1 point(s)
Method of pinging a range of IP address is called as:
Correct
Incorrect
Question 34 of 155
34. Question
1 point(s)
Scanning technique in which TCP Three-way handshaking session is initiated and
completed is called:
Correct
Incorrect
Question 35 of 155
35. Question
1 point(s)
Xmas Scan is a type of Inverse TCP Flag scanning in which:
Correct
Incorrect
Question 36 of 155
36. Question
1 point(s)
What is true about Enumeration:
Correct
Incorrect
Question 37 of 155
37. Question
1 point(s)
NetBIOS is basically
Correct
Incorrect
Question 38 of 155
38. Question
1 point(s)
Which port does not belong to NetBIOS over TCP (NetBT):
Correct
Incorrect
Question 39 of 155
39. Question
1 point(s)
Which of the following does not belong to NetBIOS Enumeration?
Correct
Incorrect
Question 40 of 155
40. Question
1 point(s)
The command nbstat with the option “-a” extract the information of:
Correct
Incorrect
Question 41 of 155
41. Question
1 point(s)
The command nbstat with the option “-A” extract the information of:
Correct
Incorrect
Question 42 of 155
42. Question
1 point(s)
Following is not an example of SNMP Manager software
Correct
Incorrect
Question 43 of 155
43. Question
1 point(s)
Which of the following is correct about SNMP?
Correct
Incorrect
Question 44 of 155
44. Question
1 point(s)
Which of the following statement is true about NTP authentication?
Correct
Incorrect
Question 45 of 155
45. Question
1 point(s)
The process of finding weaknesses, design flaws and security concerns in a network,
operating system, applications or website is called
Correct
Incorrect
Question 46 of 155
46. Question
1 point(s)
Which of the following is a Pre-Assessment phase of Vulnerability Assessment Life-
Cycle?
Correct
Incorrect
Question 47 of 155
47. Question
1 point(s)
Vulnerability Post Assessment phase includes
Correct
Incorrect
Question 48 of 155
48. Question
1 point(s)
Vulnerability assessment process in which auditor follows different strategies for each
network component is called:
Correct
Incorrect
Question 49 of 155
49. Question
1 point(s)
Approach to assist depending on the inventory of protocols in an environment is
called
Correct
Incorrect
Question 50 of 155
50. Question
1 point(s)
CVSS Stands for
Correct
Incorrect
Question 51 of 155
51. Question
1 point(s)
Vulnerability Database launched by NIST is:
Correct
Incorrect
Question 52 of 155
52. Question
1 point(s)
Which of the following is not a Vulnerability Scanning tool?
Correct
Incorrect
Question 53 of 155
53. Question
1 point(s)
Which of the following is not an example of Non-Electronic / Non-Technical Password
Attacks?
Correct
Incorrect
Question 54 of 155
54. Question
1 point(s)
Bob is cracking a password using the list of known and common phrases until the
password is accepted. Which type of attack is this?
Correct
Incorrect
Question 55 of 155
55. Question
1 point(s)
An attacker is cracking the password by trying every possible combination of alpha-
numeric characters, which of the following type of Password Cracking is this?
Correct
Incorrect
Question 56 of 155
56. Question
1 point(s)
Addition of characters in the password to make it one-way function is called
Correct
Incorrect
Question 57 of 155
57. Question
1 point(s)
Which of the following statement is the appropriate definition of malware?
Correct
Incorrect
Question 58 of 155
58. Question
1 point(s)
Which of the following is a framework that can perform automated attacks on
services, applications, port & unpatched software?
Correct
Incorrect
Question 59 of 155
59. Question
1 point(s)
Cracking password with precomputed hashes is
Correct
Incorrect
Question 60 of 155
60. Question
1 point(s)
How can you mitigate Rainbow table attack?
Correct
Incorrect
Question 61 of 155
61. Question
1 point(s)
Which of the following does not belongs to the virus?
Correct
Incorrect
Question 62 of 155
62. Question
1 point(s)
Malware Static Analysis is
Correct
Incorrect
Question 63 of 155
63. Question
1 point(s)
Malware Dynamic Analysis
Correct
Incorrect
Question 64 of 155
64. Question
1 point(s)
Which of the following does not belongs to Trojan deployment?
Correct
Incorrect
Question 65 of 155
65. Question
1 point(s)
Following is used to hide malicious program while creating Trojan
Correct
Incorrect
Question 66 of 155
66. Question
1 point(s)
Following is used to bind malicious program while creating Trojan
Correct
Incorrect
Question 67 of 155
67. Question
1 point(s)
Following is used to drop malicious program at the target
Correct
Incorrect
Question 68 of 155
68. Question
1 point(s)
Sniffing is performed over
Correct
Incorrect
Question 69 of 155
69. Question
1 point(s)
Sniffing without interfering is known as
Correct
Incorrect
Question 70 of 155
70. Question
1 point(s)
The port which allows you to send a copy of packet over another port at layer 2 is
called
Correct
Incorrect
Question 71 of 155
71. Question
1 point(s)
Wiretapping with legal authorization is called
Correct
Incorrect
Question 72 of 155
72. Question
1 point(s)
Which is the best option to defend against ARP poisoning
Correct
Incorrect
Question 73 of 155
73. Question
1 point(s)
A phishing attack is performed over
Correct
Incorrect
Question 74 of 155
74. Question
1 point(s)
Basic Purpose of Social Engineering attacks are
Correct
Incorrect
Question 75 of 155
75. Question
1 point(s)
Which of the following is not a type of Human-based Social Engineering?
Correct
Incorrect
Question 76 of 155
76. Question
1 point(s)
Attack performed by a disgruntled employee of an organization is called
Correct
Incorrect
Question 77 of 155
77. Question
1 point(s)
To defend against phishing attack, the necessary step is
Correct
Incorrect
Question 78 of 155
78. Question
1 point(s)
The technique of passing restricted area of an unauthorized person with an authorized
person is called
Correct
Incorrect
Question 79 of 155
79. Question
1 point(s)
The technique of passing restricted area of an unauthorized person by following an
authorized person is called
Correct
Incorrect
Question 80 of 155
80. Question
1 point(s)
Which of the following Wireshark filter displays packet from 10.0.0.1?
Correct
Incorrect
Question 81 of 155
81. Question
1 point(s)
An attack, which denied the services, and resources become unavailable for legitimate
users is known as
Correct
Incorrect
Question 82 of 155
82. Question
1 point(s)
DoS attack in which flooding of the request overloads web application or web server is
known as
Correct
Incorrect
Question 83 of 155
83. Question
1 point(s)
DoS Attack focused on hardware sabotage is known as
Correct
Incorrect
Question 84 of 155
84. Question
1 point(s)
DoS attack in which intermediary and Secondary victims are also involved in the
process of launching a DoS attack is known as:
Correct
Incorrect
Question 85 of 155
85. Question
1 point(s)
Scanning technique with a list of potentially vulnerable machines is known as
Correct
Incorrect
Question 86 of 155
86. Question
1 point(s)
Scanning any IP address from IP address Space for vulnerabilities is called
Correct
Incorrect
Question 87 of 155
87. Question
1 point(s)
When an attacker directly exploits and Copy the malicious code to the victim’s
machine, the propagation is:
Correct
Incorrect
Question 88 of 155
88. Question
1 point(s)
When an attacker exploits the vulnerable system, and open a connection to transfer
malicious code, the propagation is called
Correct
Incorrect
Question 89 of 155
89. Question
1 point(s)
An automated process of detecting DoS/DDoS attacks by analysis of input signals is
called
Correct
Incorrect
Question 90 of 155
90. Question
1 point(s)
Sequential Change-Point detection algorithm uses the following technique to detect
DoS/DDoS attack
Correct
Incorrect
Question 91 of 155
91. Question
1 point(s)
Following Filtering Standard is designed for Ingress filtering for multi-homed
networks to limit the DDoS attacks.
Correct
Incorrect
Question 92 of 155
92. Question
1 point(s)
The process of silently dropping the traffic (either incoming or outgoing traffic) so
that the source is not notified about discarding of the packet.
Correct
Incorrect
Question 93 of 155
93. Question
1 point(s)
Which statement defines session hijacking most accurately?
Correct
Incorrect
Question 94 of 155
94. Question
1 point(s)
Which of the following does not belongs to Session hijacking attack?
Correct
Incorrect
Question 95 of 155
95. Question
1 point(s)
In Session hijacking, a technique is used to send packets via specific route, i.e.,
identical to victim’s path, this technique is known as
Correct
Incorrect
Question 96 of 155
96. Question
1 point(s)
Session Fixation is vulnerable to
Correct
Incorrect
Question 97 of 155
97. Question
1 point(s)
HIDS is deployed to monitor activities on the following
Correct
Incorrect
Question 98 of 155
98. Question
1 point(s)
A computer system is placed in between public and private network, certain roles and
responsibilities are assigned to this computer to perform. This System is known as
Correct
Incorrect
Question 99 of 155
99. Question
1 point(s)
Cisco ASA with FirePOWER Services is an example of
Correct
Incorrect
Question 100 of 155
100. Question
1 point(s)
The devices or system that are deployed to trap attackers attempting to gain
unauthorized access to the system or network as they are deployed in an isolated
environment and being monitored are known as
Correct
Incorrect
Question 101 of 155
101. Question
1 point(s)
Which of the following is not appropriate for IDS evasion?
Correct
Incorrect
Question 102 of 155
102. Question
1 point(s)
Sending Split packet out-of-order with delay is an example of
Correct
Incorrect
Question 103 of 155
103. Question
1 point(s)
Which of the following is not a type of Open Source Web Server architecture?
Correct
Incorrect
Question 104 of 155
104. Question
1 point(s)
An attacker is attempting trial and error method to access restricted directories using
dots and slash sequences. Which type of Web server attack is this?
Correct
Incorrect
Question 105 of 155
105. Question
1 point(s)
An attacker sends a request which allows him to add header response; now he
redirects the user to a malicious website. Which type of attack is this?
Correct
Incorrect
Question 106 of 155
106. Question
1 point(s)
Update that is specially designed to fix the issue for a live production environment is
called
Correct
Incorrect
Question 107 of 155
107. Question
1 point(s)
A piece of Software developed to fix an issue
Correct
Incorrect
Question 108 of 155
108. Question
1 point(s)
Which of the following is Patch Management tool?
Correct
Incorrect
Question 109 of 155
109. Question
1 point(s)
Individual who is responsible for the management and configuration required for the
web application is called
Correct
Incorrect
Question 110 of 155
110. Question
1 point(s)
Which of the Following is not a Back-end Programming language?
Correct
Incorrect
Question 111 of 155
111. Question
1 point(s)
Which of the Following is not a Front-end Programming language?
Correct
Incorrect
Question 112 of 155
112. Question
1 point(s)
Web Applications working is categorized into the following three basic layers:
Correct
Incorrect
Question 113 of 155
113. Question
1 point(s)
An attacker has accessed the web application. Now, he is escalating privileges to
access sensitive information. Which type of web application attack is this?
Correct
Incorrect
Question 114 of 155
114. Question
1 point(s)
Which of the following is not appropriate for Data Connectivity attack between
application and its database?
Correct
Incorrect
Question 115 of 155
115. Question
1 point(s)
Inferential Injection is also called as
Correct
Incorrect
Question 116 of 155
116. Question
1 point(s)
An attack is using same communication channel to launch the injection attack and
gather information from the response. Which type of SQL injection is being
performed?
Correct
Incorrect
Question 117 of 155
117. Question
1 point(s)
Which SQL statement is used to extract data from a database?
Correct
Incorrect
Question 118 of 155
118. Question
1 point(s)
Which SQL statement is used to update data in a database?
Correct
Incorrect
Question 119 of 155
119. Question
1 point(s)
What does SQL stand for?
Correct
Incorrect
Question 120 of 155
120. Question
1 point(s)
Name of Access Point that is usually broadcasting for the identification of wireless
network is called
Correct
Incorrect
Question 121 of 155
121. Question
1 point(s)
In a Wi-Fi Network with Open Authentication, how many frames are communicated
between client and AP to complete authentication process?
Correct
Incorrect
Question 122 of 155
122. Question
1 point(s)
In a Wi-Fi Network with Shared Key Authentication, how many frames are
communicated between client and AP to complete authentication process?
Correct
Incorrect
Question 123 of 155
123. Question
1 point(s)
Wi-Fi authentication with centralized authentication server deployed using
Correct
Incorrect
Question 124 of 155
124. Question
1 point(s)
Doughnut Shaped Radiation pattern is obtained from
Correct
Incorrect
Question 125 of 155
125. Question
1 point(s)
Which Wireless encryption uses 24-bit Initialization Vector to create RC4 with CRC?
Correct
Incorrect
Question 126 of 155
126. Question
1 point(s)
Which of the following protocol ensures per packet key by dynamically generating a
128-bit key?
Correct
Incorrect
Question 127 of 155
127. Question
1 point(s)
In Bluetooth network, target devices are overflowed by random packets. Which type of
Bluetooth attack is this?
Correct
Incorrect
Question 128 of 155
128. Question
1 point(s)
The attacker is attempting to gain remote access to a Bluetooth device to compromise
its security, which type of attack is this?
Correct
Incorrect
Question 129 of 155
129. Question
1 point(s)
Which of the following tool is appropriate for packet sniffing in a wireless network?
Correct
Incorrect
Question 130 of 155
130. Question
1 point(s)
Which device can detect rogue wireless access point?
Correct
Incorrect
Question 131 of 155
131. Question
1 point(s)
Jailbreaking refers to:
Correct
Incorrect
Question 132 of 155
132. Question
1 point(s)
When an iOS device is rebooted, it will no longer have a patched kernel, may stick in a
partially started state. Which type of Jailbreaking is performed on it?
Correct
Incorrect
Question 133 of 155
133. Question
1 point(s)
Official Application store for Blackberry platform is
Correct
Incorrect
Question 134 of 155
134. Question
1 point(s)
Which is the most appropriate solution if an administrator is requires monitoring and
control over mobile devices running on a corporate network?
Correct
Incorrect
Question 135 of 155
135. Question
1 point(s)
How many layers are there in an architecture of IoT?
Correct
Incorrect
Question 136 of 155
136. Question
1 point(s)
Which layer in IoT architecture is responsible for device and information
management?
Correct
Incorrect
Question 137 of 155
137. Question
1 point(s)
Which layer is responsible for Protocol translation and messaging?
Correct
Incorrect
Question 138 of 155
138. Question
1 point(s)
Which SQL Query is correct to extract only “UserID” field from the “Employees” table in the database?
Correct
Incorrect
Question 139 of 155
139. Question
1 point(s)
IoT device directly communicating with the application server is:
Correct
Incorrect
Question 140 of 155
140. Question
1 point(s)
An eavesdropper records the transmission and replays it at a later time to cause the
receiver to ‘unlock’, this attack is known as:
Correct
Incorrect
Question 141 of 155
141. Question
1 point(s)
IaaS Cloud Computing Service offers
Correct
Incorrect
Question 142 of 155
142. Question
1 point(s)
Following is an example of SaaS
Correct
Incorrect
Question 143 of 155
143. Question
1 point(s)
Cloud deployment model accessed by multiple parties having shared resources is a:
Correct
Incorrect
Question 144 of 155
144. Question
1 point(s)
A person or organization that maintains a business relationship with, and uses service
from Cloud Providers is known as
Correct
Incorrect
Question 145 of 155
145. Question
1 point(s)
A person who negotiates the relationship between Cloud Provider & Consumer is
called
Correct
Incorrect
Question 146 of 155
146. Question
1 point(s)
Symmetric Key Cryptography requires
Correct
Incorrect
Question 147 of 155
147. Question
1 point(s)
AES & DES are the examples of
Correct
Incorrect
Question 148 of 155
148. Question
1 point(s)
The cipher that encrypts the plain text one by one is known as
Correct
Incorrect
Question 149 of 155
149. Question
1 point(s)
64-bit Block Size, 56-bit Key size, & 16 number of rounds are the parameters of
Correct
Incorrect
Question 150 of 155
150. Question
1 point(s)
Digital Certificate’s “Subject” field shows
Correct
Incorrect
Question 151 of 155
151. Question
1 point(s)
RSA key length varies from
Correct
Incorrect
Question 152 of 155
152. Question
1 point(s)
The message digest is used to ensure
Correct
Incorrect
Question 153 of 155
153. Question
1 point(s)
MD5 produces hash value of
Correct
Incorrect
Question 154 of 155
154. Question
1 point(s)
Cryptographic attack type where a cryptanalyst has access to a ciphertext but does not
have access to the corresponding plaintext is called
Correct
Incorrect
Question 155 of 155
155. Question
1 point(s)
The most secure way to mitigate information theft from a laptop of an organization
left in a public place is
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.