Ethical Hacking MCQ Banner

Ethical Hacking Multiple Choice Questions (MCQs) and Answers

Master Ethical Hacking with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Ethical Hacking concepts. Begin your placement preparation journey now!

Q121

Q121 What is the primary purpose of cryptography?

A

To store data

B

To secure communication

C

To increase processing speed

D

To bypass firewalls

Q122

Q122 Which encryption algorithm is most commonly used for secure web transactions?

A

RSA

B

AES

C

3DES

D

Blowfish

Q123

Q123 How does asymmetric encryption differ from symmetric encryption?

A

Asymmetric encryption uses a single key

B

Asymmetric encryption is faster

C

Asymmetric encryption uses public and private keys

D

Symmetric encryption requires authentication

Q124

Q124 What is the main advantage of elliptic curve cryptography (ECC)?

A

High encryption speed

B

Shorter keys with similar security

C

Universal compatibility

D

Larger key size

Q125

Q125 Which Python library is commonly used for cryptographic operations?

A

Crypto

B

Cryptography

C

Requests

D

Hashlib

Q126

Q126 What does the following Python code do: from cryptography.fernet import Fernet followed by key = Fernet.generate_key()?

A

Generates a symmetric key

B

Generates a hash

C

Generates a public key

D

Encrypts data

Q127

Q127 How can an ethical hacker encrypt a file using OpenSSL?

A

openssl file encrypt -aes

B

openssl enc -aes-256-cbc -in file -out file.enc

C

openssl encrypt file

D

openssl encrypt -aes256

Q128

Q128 A public key fails to decrypt a message. What is the likely cause?

A

Incorrect public key

B

Encrypted with the private key

C

Outdated algorithm

D

Corrupted data

Q129

Q129 An encrypted file cannot be decrypted due to a lost key. What should the ethical hacker do?

A

Recover the key from backup

B

Use a dictionary attack

C

Ignore the file

D

Try brute forcing the encryption

Q130

Q130 What is the primary purpose of a firewall?

A

To block all network traffic

B

To encrypt data

C

To filter incoming and outgoing traffic

D

To scan for malware

Q131

Q131 How does an Intrusion Detection System (IDS) function?

A

By actively blocking threats

B

By monitoring and alerting about suspicious activity

C

By encrypting network traffic

D

By restricting access to specific IPs

Q132

Q132 What is the key difference between IDS and IPS?

A

IDS is active, IPS is passive

B

IDS monitors, IPS prevents

C

IDS encrypts traffic, IPS filters packets

D

IDS uses firewalls, IPS does not

Q133

Q133 Which command in Linux lists the currently active firewall rules?

A

iptables -L

B

netstat -an

C

iptables --show

D

firewall -rules

Q134

Q134 How can an ethical hacker test firewall rules using Nmap?

A

nmap -sP target

B

nmap -sS -p 80 target

C

nmap -f target

D

nmap --bypass-firewall

Q135

Q135 An IDS generates frequent false positives during testing. What should the ethical hacker do?

A

Adjust the IDS rules

B

Ignore the alerts

C

Restart the IDS

D

Disable logging

Q136

Q136 A firewall blocks legitimate traffic during penetration testing. What should the hacker do?

A

Whitelist the source IP

B

Modify the firewall rules

C

Disable the firewall

D

Ignore the issue

Q137

Q137 What is the primary goal of social engineering attacks?

A

To exploit software vulnerabilities

B

To manipulate people into revealing confidential information

C

To disrupt services

D

To encrypt data

Q138

Q138 Which type of social engineering attack involves sending fraudulent emails to gather sensitive information?

A

Phishing

B

Vishing

C

Baiting

D

Pretexting

Q139

Q139 How does a pretexting attack work?

A

By exploiting software bugs

B

By impersonating someone with authority

C

By encrypting data

D

By creating fake websites

Q140

Q140 Which Python library is commonly used to send phishing simulation emails?

A

smtplib

B

requests

C

socket

D

pycrypto

Q141

Q141 What does the following Python snippet do: email.message.Message() with smtp.sendmail(sender, recipient, message)?

A

Sends a phishing email

B

Logs user credentials

C

Sends an encrypted email

D

Captures network traffic

Q142

Q142 A user falls victim to a phishing attack simulation. What should the ethical hacker do next?

A

Log the incident and report

B

Ignore the incident

C

Disable user account

D

Restart the network

Q143

Q143 A phishing simulation email is flagged by the spam filter. What should the hacker do?

A

Modify the email content

B

Disable the spam filter

C

Use a different email address

D

Ignore the issue

Q144

Q144 What is the first step in a penetration testing process?

A

Exploitation

B

Reconnaissance

C

Vulnerability reporting

D

Remediation planning

Q145

Q145 What is the purpose of the rules of engagement (ROE) in penetration testing?

A

To define legal and operational boundaries

B

To determine tools to use

C

To perform vulnerability analysis

D

To ensure post-testing cleanup

Q146

Q146 How does post-exploitation differ from exploitation in penetration testing?

A

Post-exploitation focuses on maintaining access

B

Post-exploitation launches attacks

C

Post-exploitation involves network scanning

D

Post-exploitation disrupts services

Q147

Q147 Which Metasploit command is used to generate a penetration testing report?

A

msfconsole report

B

db_nmap

C

db_export

D

msfreport

Q148

Q148 What does the following Metasploit command do: use post/windows/gather/enum_logged_on_users?

A

Exploits a vulnerability

B

Enumerates currently logged-in users

C

Deletes system logs

D

Generates a report

Q149

Q149 A vulnerability remains unpatched after reporting. What should the ethical hacker do?

A

Exploit the vulnerability

B

Notify the client again

C

Ignore the vulnerability

D

Delete the vulnerability report

Q150

Q150 The penetration testing report is incomplete due to missing data. What should the hacker do?

A

Request additional information from the client

B

Submit the report anyway

C

Exclude the incomplete sections

D

Add assumptions to fill the gaps

ad verticalad vertical
ad