0% found this document useful (0 votes)
6 views

ETI ass5

The document consists of a series of multiple-choice questions related to hacking, cybersecurity, and ethical hacking practices. It covers various types of hackers, hacking techniques, and security measures, along with their definitions and roles in the IT industry. The answers to each question are provided, indicating the correct options for each query.

Uploaded by

kapasepratik31
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

ETI ass5

The document consists of a series of multiple-choice questions related to hacking, cybersecurity, and ethical hacking practices. It covers various types of hackers, hacking techniques, and security measures, along with their definitions and roles in the IT industry. The answers to each question are provided, indicating the correct options for each query.

Uploaded by

kapasepratik31
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Assignment No.

Sant Gajanan Maharaj Rural Polytechnic Mahagaon Dept of Computer Engineering


Subject: Emerging Trends in Computer & IT
Name: Alok Prakash Kori Date: / /2025 Roll No: 63

1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as a) Black Hat hackers

b) White Hat Hackers

c) Grey Hat Hackers

d) Red Hat Hackers

Answer: b

2. Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?

a) Cracking

b) Non ethical Hacking

c) Ethical hacking

d) Hactivism

Answer: c

3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cybercrimes.

Who are “they” referred to here? a)

Gray Hat Hackers

b) White Hat Hackers

c) Hactivists

d) Black Hat Hackers


Answer: d

4. are the combination of both white as well as black hat hackers.

a) Grey Hat hackers

b) Green Hat hackers

c) Blue Hat Hackers

d) Red Hat Hackers

Answer: a

5. The amateur or newbie in the field of hacking who don’t have many skills about coding
and in-depth working of security and hacking tools are called a) Sponsored Hackers

b) Hactivists

c) Script Kiddies

d) Whistle Blowers

Answer: c

6. Suicide Hackers are those


a) who break a system for some specific purpose with or without keeping in mind that they
may suffer long term imprisonment due to their malicious activity

b) individuals with no knowledge of codes but an expert in using hacking tools


c) who know the consequences of their hacking activities and hence try to prevent them by
erasing their digital footprints

d) who are employed in an organization to do malicious activities on other firms

Answer: a

7. Criminal minded individuals who work for terrorist organizations and steal information of
nations and

other secret intelligence are a)

State sponsored hackers

b) Blue Hat Hackers


c) Cyber Terrorists

d) Red Hat Hackers

Answer: c
8. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals
are termed as

a) Sponsored hackers

b) Crackers

c) Hactivist

d) Whistleblowers

Answer: d

9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?

a) White hat Hackers

b) Elite Hackers

c) Licensed Penetration Testers

d) Red Hat Hackers

Answer: b

10. are those individuals who maintain and handles IT security in any firm or organization. a)

IT Security Engineer

b) Cyber Security Interns

c) Software Security Specialist

d) Security Auditor

Answer: b

11. Role of security auditor is to

a) secure the network


b) probe for safety and security of organization‟s security components and systems

c) detects and prevents cyber-attacks and threats to organization

d) does penetration testing on different web applications

Answer: b

12. are senior level corporate employees who have the role and responsibilities of creating
and designing secured network or security structures. a) Ethical Hackers

b) Chief Technical Officer

c) IT Security Engineers d) Security Architect

Answer: d

13. security consultants uses database security monitoring & scanning tools to maintain

security to different data residing in the database / servers / cloud. a) Database

b) Network

c) System

d) Hardware

Answer: a

14. Governments hired some highly skilled hackers. These types of hackers are termed as a)

Special Hackers

b) Government Hackers

c) Cyber Intelligence Agents

d) Nation / State sponsored hackers

Answer: d

15. Someone (from outside) who tests security issues for bugs before launching a system or

application, and who is not a part of that organization or company are a) Black Hat hacker

b) External penetration tester


c) Blue Hat hacker

d) White Hat Hacker

Answer: c

16. The full form of Malware is

a) Malfunctioned Software

b) Multipurpose Software

c) Malicious Software

d) Malfunctioning of Security

Answer: c

17. Who deploy Malwares to a system or network?

a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists

b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists

c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists

d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers

Answer: a

18. is a code injecting method used for attacking the database of a system / website. a)

HTML injection

b) SQL Injection

c) Malicious code injection

d) XML Injection

Answer: b

19. XSS is abbreviated as

a) Extreme Secure Scripting


b) Cross Site Security

c) X Site Scripting

d) Cross Site Scripting

Answer: d

20. This attack can be deployed by infusing a malicious code in a website’s comment section.
What is “this” attack referred to here? a) SQL injection

b) HTML Injection

c) Cross Site Scripting (XSS)

d) Cross Site Request Forgery (XSRF)

Answer: c

21. When there is an excessive amount of data flow, which the system cannot handle, attack

takes place.

a) Database crash attack

b) DoS (Denial of Service) attack

c) Data overflow Attack

d) Buffer Overflow attack

Answer: d

22. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called a) Session Hijacking

b) Session Fixation

c) Cookie stuffing

d) Session Spying

Answer: a

23. Which of this is an example of physical hacking?


a) Remote Unauthorised access

b) Inserting malware loaded USB to a system

c) SQL Injection on SQL vulnerable site

d) DDoS (Distributed Denial of Service) attack

Answer: b

24. Which of them is not a wireless attack?

a) Eavesdropping

b) MAC Spoofing

c) Wireless Hijacking

d) Phishing

Answer: d

25. An attempt to harm, damage or cause threat to a system or network is broadly termed as a)

Cyber-crime

b) Cyber Attack

c) System hijacking

d) Digital crime

Answer: b

26. Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Answer: c
27. ____are the special type of programs used for recording and tracking user’s keystroke. a)

Keylogger

b) Trojans

c) Virus

d) Worms

Answer: a

28. Stuxnet is a____

a) Worm

b) Virus

c) Trojan

d) Antivirus

Answer: a

29. According to the CIA Triad, which of the below-mentioned element is not considered in
the triad?

a) Confidentiality

b) Integrity

c) Authenticity

d) Availability

Answer: c

30. is the latest technology that faces an extra challenge because of CIA paradigm. a)

Big data

b) Database systems

c) Cloud storages

d) Smart dust
Answer: a

31. One common way to maintain data availability is

a) Data clustering

b) Data backup

c) Data recovery

d) Data Altering

Answer: b

32. is the practice and precautions taken to protect valuable information from unauthorised

access, recording, disclosure or destruction. a) Network Security

b) Database Security

c) Information Security

d) Physical Security

Answer: c

33. From the options below, which of them is not a vulnerability to information security? a)

flood

b) without deleting data, disposal of storage media

c) unchanged default password

d) latest patches and updates not done

Answer: a

34. platforms are used for safety and protection of information in the cloud.

a) Cloud workload protection platforms

b) Cloud security protocols

c) AWS
d) One Drive

Answer: a

35. technology is used for analyzing and monitoring traffic in network and information flow.

a) Cloud access security brokers (CASBs)

b) Managed detection and response (MDR)

c) Network Security Firewall

d) Network traffic analysis (NTA)

Answer: d

36. Compromising confidential information comes under

a) Bug

b) Threat

c) Vulnerability

d) Attack

Answer: b

37. Lack of access control policy is a

a) Bug

b) Threat

c) Vulnerability

d) Attack

Answer: c

38. Possible threat to any information cannot be

a) reduced

b) transferred

c) protected
d) ignored

Answer: d

39. How many basic processes or steps are there in ethical hacking? a)

b) 5

c) 6

d) 7

Answer: c

40. is the information gathering phase in ethical hacking from the target user. a)

Reconnaissance

b) Scanning

c) Gaining access

d) Maintaining access

Answer: a

41. Which of the following is not a reconnaissance tool or technique for information

gathering? a) Hping

b) NMAP

c) Google Dorks

d) Nexpose

Answer: d

42. There are subtypes of reconnaissance.

a) 2

b) 3

c) 4
d) 5

Answer: a

43. Which of the following is an example of active reconnaissance?

a) Searching public records

b) Telephone calls as a help desk or fake customer care person

c) Looking forthetarget‟sdetails inthedatabase

d) Searchingthe target‟sdetails inpaperfiles

Answer: b

44. Which of the following is an example of passive reconnaissance?

a) Telephonic calls to target victim

b) Attacker as a fake person for Help Desk support

c) Talk to the target user in person

d) Search about target records in online people database

Answer: d

45. Which of them does not comes under scanning methodologies?

a) Vulnerability scanning

b) Sweeping

c) Port Scanning

d) Google Dorks

Answer: d

46. Which of them is not a scanning tool?

a) NMAP

b) Nexpose

c) Maltego
d) Nessus

Answer: c

47. Which of the following comes after scanning phase in ethical hacking? a)

Scanning

b) Maintaining access

c) Reconnaissance

d) Gaining access

Answer: d

48. In phase the hacker exploits the network or system vulnerabilities.

a) Scanning

b) Maintaining access

c) Reconnaissance

d) Gaining access

Answer: d

49. A can gain access illegally to a system if the system is not properly tested in scanning

and gaining access phase. a) security officer

b) malicious hacker

c) security auditor

d) network analyst

Answer: b

50. Which of the following hacking tools and techniques hackers’ do not use for maintaining
access in a system?

a) Rootkits

b) Backdoors
c) Trojans

d) Wireshark Answer: d

You might also like