ETI ass5
ETI ass5
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as a) Black Hat hackers
Answer: b
2. Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
c) Ethical hacking
d) Hactivism
Answer: c
3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cybercrimes.
c) Hactivists
Answer: a
5. The amateur or newbie in the field of hacking who don’t have many skills about coding
and in-depth working of security and hacking tools are called a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
Answer: a
7. Criminal minded individuals who work for terrorist organizations and steal information of
nations and
Answer: c
8. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals
are termed as
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
b) Elite Hackers
Answer: b
10. are those individuals who maintain and handles IT security in any firm or organization. a)
IT Security Engineer
d) Security Auditor
Answer: b
Answer: b
12. are senior level corporate employees who have the role and responsibilities of creating
and designing secured network or security structures. a) Ethical Hackers
Answer: d
13. security consultants uses database security monitoring & scanning tools to maintain
b) Network
c) System
d) Hardware
Answer: a
14. Governments hired some highly skilled hackers. These types of hackers are termed as a)
Special Hackers
b) Government Hackers
Answer: d
15. Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are a) Black Hat hacker
Answer: c
a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security
Answer: c
Answer: a
18. is a code injecting method used for attacking the database of a system / website. a)
HTML injection
b) SQL Injection
d) XML Injection
Answer: b
c) X Site Scripting
Answer: d
20. This attack can be deployed by infusing a malicious code in a website’s comment section.
What is “this” attack referred to here? a) SQL injection
b) HTML Injection
Answer: c
21. When there is an excessive amount of data flow, which the system cannot handle, attack
takes place.
Answer: d
22. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
Answer: a
Answer: b
a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
Answer: d
25. An attempt to harm, damage or cause threat to a system or network is broadly termed as a)
Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
Answer: b
a) Keyhijacking
b) Keyjacking
c) Keylogging
d) Keyboard monitoring
Answer: c
27. ____are the special type of programs used for recording and tracking user’s keystroke. a)
Keylogger
b) Trojans
c) Virus
d) Worms
Answer: a
a) Worm
b) Virus
c) Trojan
d) Antivirus
Answer: a
29. According to the CIA Triad, which of the below-mentioned element is not considered in
the triad?
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
Answer: c
30. is the latest technology that faces an extra challenge because of CIA paradigm. a)
Big data
b) Database systems
c) Cloud storages
d) Smart dust
Answer: a
a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering
Answer: b
32. is the practice and precautions taken to protect valuable information from unauthorised
b) Database Security
c) Information Security
d) Physical Security
Answer: c
33. From the options below, which of them is not a vulnerability to information security? a)
flood
Answer: a
34. platforms are used for safety and protection of information in the cloud.
c) AWS
d) One Drive
Answer: a
35. technology is used for analyzing and monitoring traffic in network and information flow.
Answer: d
a) Bug
b) Threat
c) Vulnerability
d) Attack
Answer: b
a) Bug
b) Threat
c) Vulnerability
d) Attack
Answer: c
a) reduced
b) transferred
c) protected
d) ignored
Answer: d
39. How many basic processes or steps are there in ethical hacking? a)
b) 5
c) 6
d) 7
Answer: c
40. is the information gathering phase in ethical hacking from the target user. a)
Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
Answer: a
41. Which of the following is not a reconnaissance tool or technique for information
gathering? a) Hping
b) NMAP
c) Google Dorks
d) Nexpose
Answer: d
a) 2
b) 3
c) 4
d) 5
Answer: a
Answer: b
Answer: d
a) Vulnerability scanning
b) Sweeping
c) Port Scanning
d) Google Dorks
Answer: d
a) NMAP
b) Nexpose
c) Maltego
d) Nessus
Answer: c
47. Which of the following comes after scanning phase in ethical hacking? a)
Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
Answer: d
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
Answer: d
49. A can gain access illegally to a system if the system is not properly tested in scanning
b) malicious hacker
c) security auditor
d) network analyst
Answer: b
50. Which of the following hacking tools and techniques hackers’ do not use for maintaining
access in a system?
a) Rootkits
b) Backdoors
c) Trojans
d) Wireshark Answer: d