0% found this document useful (0 votes)
36 views8 pages

ETHICAL

The document contains a multiple choice quiz about ethical hacking and cybersecurity concepts with 40 questions and answers. It covers topics like data integrity, VPNs, SSL, hackers, adware, black hat vs white hat hackers, viruses, personally identifiable information, gray hat hackers, tabletop exercises, the ps command, appropriate definitions of hackers, known hackers, IoT, patches, open source intelligence, ethical hacking stages like reconnaissance, laws like RIPA, GDPR, the Data Protection Act, keyloggers, and hacktivism.

Uploaded by

Mosisa Bersisa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views8 pages

ETHICAL

The document contains a multiple choice quiz about ethical hacking and cybersecurity concepts with 40 questions and answers. It covers topics like data integrity, VPNs, SSL, hackers, adware, black hat vs white hat hackers, viruses, personally identifiable information, gray hat hackers, tabletop exercises, the ps command, appropriate definitions of hackers, known hackers, IoT, patches, open source intelligence, ethical hacking stages like reconnaissance, laws like RIPA, GDPR, the Data Protection Act, keyloggers, and hacktivism.

Uploaded by

Mosisa Bersisa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Ethical Hacking MCQ Questions and Answer PDF

1. If the integrity of data is compromised it means that?

1. It has not been backed up


2. It has been changed in some way
3. It has been copied
4. The legitimate user no longer has access to it

Answer: It has been changed in some way

2. VPN stands for____________

1. Very Private Network


2. Varied Private Network
3. Virtual Private Network
4. Virtual Public Network

Answer: Virtual Private Network

3. When paying for products online it is best to check the website starts with the
protocol HTTPS and shows a padlock. What is this known as?

1. Security lab
2. Secure Socket Layer
3. Encryption
4. Firewall

Answer: Secure Socket Layer

4. What is a hackers?

1. someone who helps others


2. a person who does not know how to turn on a computer
3. A hacker is someone who discovers the weaknesses of a computer or computer
network
4. a person who spends a lot of time with his smartphone

Answer: A hacker is someone who discovers the weaknesses of a computer or computer


network

5. How is adware malicious?

1. Inappropriate and wastes your time


2. Deletes files
3. Spies on you, collecting your information
4. Slows your pc down
Answer: Inappropriate and wastes your time

6. Hackers who engage in hacking for illegal purposes are known as which of the
following?

1. Black hat hacker


2. Red hat hacker
3. White hat hacker
4. Blue hat hacker

Answer: Black hat hacker

7. What can a virus do to your computer?

1. Delete files
2. Spy on what you are doing
3. Steal your information
4. Cause inappropriate adverts to appear

Answer: Delete files

8. Personal Information________________

1. TOE (Target of Evaluation)


2. OSINT (Open Source Intelligence)
3. PII (Personally Identifiable Information)
4. Zero Day

Answer: PII (Personally Identifiable Information)

9. What is a gray hat hackers?

1. hacker who works for security companies


2. hacker who performs illegal activity, just to commit a crime
3. hacker who attends church after committing a crime
4. hacker engaging in illegal activity, even with good intentions

Answer: hacker engaging in illegal activity, even with good intentions

10. What is a Tabletop exercise?

1. A dummy exercise with networking models on a Tabletop


2. A planned exercise allowed organizations to evaluate their response to a cyber attack
3. An authorized attack on a computer system
4. A rehearsal cyber attack performed on a smaller organization before attacking a large
organization

Answer: A planned exercise allowed organizations to evaluate their response to a cyber


attack
11. What does the "ps" command display

1. process list
2. Remote machines
3. protective scanner
4. Session list

Answer: process list

12. Which is the most appropriate definition of a hacker?

1. Someone who accesses your home without your permission


2. Is someone who gains unauthorized access to an IT system such as a computer,
website or email account.
3. All of above
4. None of above

Answer: Is someone who gains unauthorized access to an IT system such as a computer,


website or email account.

13. Which of the following characters was known as c0mrade

1. Kevin Mitnick
2. Jonny Lee Miller
3. Albert González
4. Jonathan James

Answer: Jonathan James

14. How does a worm infect a computer?

1. Through security loopholes, your computer is not up to date


2. Suspicious web links
3. On memory sticks
4. E-mail attachments

Answer: Through security loopholes, your computer is not up to date

15. Which of these characters is a known hacker?

1. Steve Jobs
2. Bill Gates
3. Jonny Lee Miller
4. Kevin Mitnick

Answer: Kevin Mitnick

16. What does IoT stand for?

1. Internet of Technologies
2. Internet over Telephone
3. Internet of Things
4. Internet of Types

Answer: Internet of Things

17. When a flaw in a computer system is fixed this is called a _________

1. buggy
2. Patch
3. All of above
4. None of above

Answer: Patch

18. Open Source Intelligence_______________

1. OSINT
2. Daisy Chaining
3. PII
4. Hack Value

Answer: OSINT

19. A ping sweep would involve what stage of ethical hacking?

1. Sniffing
2. Vulnerability Scanning
3. Gaining Access
4. Reconnaissance

Answer: Reconnaissance

20. Which of the following laws prevents unlawful and authorized interception of
electronic communication?

1. Regulation of Investigation Act


2. Regulator of Investigation Powers Act
3. Regulation of Investigatory Powers Act
4. Regulating of Investigations Act

Answer: Regulation of Investigatory Powers Act

21. What is a Drive-by download?

1. Software that is downloaded from a car


2. A user who drives by a WiFi hotspot to download a file
3. Clicking to accept a software download from a website
4. malicious code downloading on to a device in the background when visiting a website
Answer: malicious code downloading on to a device in the background when visiting a
website

22. MAC address spoofing is which type of attack?

1. Brute-force
2. Encryption
3. Social engineering
4. Authentication

Answer: Authentication

23. What does RIPA stand for?

1. Regulation of Information Powers Act


2. Regulation of Investigatory Protection Act
3. Recovery of Investigatory Powers Act
4. Regulation of Investigatory Powers Act

Answer: Regulation of Investigatory Powers Act

24. What does GDPR stand for?

1. General Data Protection Regulation


2. General Disclosure Protection Regulations
3. General Data Protection Records
4. Great Danes Performance Ratings

Answer: General Data Protection Regulation

25. With regards to data stored in countries outside of Europe, GDPR states what?

1. It can only be transferred to a country when an adequate level of protection is


guaranteed
2. It can be transferred to any country when it is no longer up to date
3. It can be be transferred to any Commonwealth country
4. It can be stored in any country with a working government

Answer: It can only be transferred to a country when an adequate level of protection is


guaranteed

26. Set file permissions_______________

1. cat
2. chmod
3. cd
4. mkdir

Answer: chmod
27. The Copyright, Designs and Patents Act 1988 is designed to protect all types of IP.
What does IP stand for?

1. Intellectual Patents
2. Individual Property
3. Intellectual Property
4. Individual Patents

Answer: Intellectual Property

28. Creates a directory__________

1. mkdir
2. less
3. cd
4. cat

Answer: mkdir

29. Opens the current working directory in the GUI

1. xdg-open
2. cd
3. cd
4. less

Answer: xdg-open

30. What type of ethical hack tests access to the physical infrastructure?

1. Remote network
2. External network
3. Internal network
4. Physical access

Answer: Physical access

31. Navigates to a directory_______________

1. chmod
2. cd
3. mkdir
4. cat

Answer: cd

32. Which one of the following laws extends police powers and grants the home office
greater control over operational policing?

1. Police and Home Office Act


2. Data Protection Act
3. Police and Justice Act
4. Data Police Investigation Act

Answer: Police and Justice Act

33. What is the first phase of hacking?

1. Gaining access
2. Maintaining access
3. Attack
4. Reconnaissance

Answer: Reconnaissance

34. what a key measure of the Investigatory Powers Act 2016.

1. Internet and Communications companies must not share customers' browser history
with anyone
2. Internet and Communications companies must retain customers' browser history for
up to a year
3. Internet and Communications companies must not keep customers' browser history
for any length of time
4. Internet and Communications companies must delete customers' browser history after
each session

Answer: Internet and Communications companies must retain customers' browser


history for up to a year

35. Data Protection Act 1998 is designed to what?

1. To protect personal data stored on computers or in an organized paper filing system


2. To enable everyone to access all data
3. To allow people to use data systems where their details are stored
4. none of the above

Answer: To protect personal data stored on computers or in an organized paper filing


system

36. Please select two principles of the Data Protection Act__________

1. Data should be accurate


2. Data should not be kept for longer than necessary
3. Data should be sold for the highest price
4. Both 1 & 2

Answer: Both 1 & 2

37. What replaced the Data Protection Act in May 2018?


1. General Data Protection Act 2018
2. Grand Data Protection Rules
3. Data Protection Directive
4. General Data Protection Regulation

Answer: General Data Protection Regulation

38. Which data law gives you more rights?

1. GDPR
2. Data Protection Act
3. All of above
4. None of Above

Answer: GDPR

39. Which one of the following is the name of the software that is designed to record
every action which is typed with the aim of stealing sensitive data?

1. Worm
2. Keylogger
3. Keylogger
4. Trojan horse

Answer: Keylogger

40. Hacking for a cause is called______________

1. Hacktivism
2. Activism
3. Active hacking
4. Black-hat hacking

Answer: Hacktivism

You might also like