Ethical Hacking Practice Test Quiz: Trivia! tests knowledge on cybersecurity essentials, including attack types, hacker roles, and system vulnerabilities. It assesses skills in identifying and mitigating security threats, making it ideal for learners aiming to enhance their defensive hacking capabilities.
Hacktivist
Grey hat Hacker
Black hat Hacker
White hat Hacker
Rate this question:
Day 1 attackÂ
 Zero-day attack
ExploitÂ
Category I attack
Rate this question:
ScanningÂ
ReconnaissanceÂ
EnumerationÂ
FootprintingÂ
Rate this question:
Threat
Exploit
Vulnerability
Attack
Rate this question:
Ethical Hacker
Grey Hat Hacker
Cyber Terrorist
Script Kiddie
Rate this question:
Social engineering
Passive FootPrinting
Active FootPrinting
Enumeration
Rate this question:
53
67
Rate this question:
Character
Brute Force
Rainbow Tables
Dictionary
Rate this question:
/etc/shadow
SAM file
PASSWORDS file
C:\Windows\system32\shadow
Rate this question:
Telnet
FTP
SSH
HTTP
Rate this question:
NMAP
NIKTO
CAIN ABEL
John the Ripper
Rate this question:
TLS
RSA
GRE
IPSec
Rate this question:
Terms of Engagement
Project Scope
Non-Disclosure Agreement
Service Level Agreement
Rate this question:
RST
SYN
SYN-ACK
ACK
Rate this question:
Scanning
Reconnaissance
Escalation
Enumeration
Rate this question:
Penetration testing
Social engineering
Vulnerability scanning
Access control list reviews
Rate this question:
NMAP
Nessus
Metasploit
Cain
Rate this question:
SQL injection attack
Cross-Site Scripting (XSS)
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
Rate this question:
-T0
-T5
-O
-A
Rate this question:
TCP/UDP Port scanning
Firewall detection
OS Detection
Checking if the remote host is alive
Rate this question:
The internal operation of a system is only partly accessible to the tester.
The internal operation of a system is completely known to the tester.
Only the external operation of a system is accessible to the tester.
Only the internal operation of a system is known to the tester.
Rate this question:
Internal Whitebox
External, Whitebox
Internal, Blackbox
External, Blackbox
Rate this question:
Social Engineering
Sniffing
Eavesdropping
Scanning
Rate this question:
Use SSL sites when entering personal information
Use Tor network with multi-node
Use shared WiFi
Use public VPN
Rate this question:
SQL injections
Man-in-the-middle
Cross-site scripting
ARP poisoning
Rate this question:
Say no; the friend is not the owner of the account.
Say yes; the friend needs help to gather evidence.
Say yes; do the job for free.
Say no; make sure that the friend knows the risk she's asking the CEH to take.
Rate this question:
Port Scanning
Hacking Active Directory
Privilege Escalation
Shoulder-Surfing
Rate this question:
[cache:]
[site:]
[inurl:]
[link:]
Rate this question:
Gaining access
Escalating privileges
Network mapping
Footprinting
Rate this question:
TCP Connect/Full Open Scan
Half-open Scan
NULL Scan
Xmas Scan
Rate this question:
Zero-day
Zero-hour
Zero-sum
No-day
Rate this question:
Maltego
Cain & Abel
Metasploit
Wireshark
Rate this question:
Use fences in the entrance doors.
Install a CCTV with cameras pointing to the entrance doors and the street.
Use an IDS in the entrance doors and install some of them near the corners.
Use lights in all the entrance doors and along the company's perimeter.
Rate this question:
Hack attack
Sniffing
Dumpster diving
Spying
Rate this question:
Nmap -sU
Nmap -sS
Nmap -sM
Nmap -sT
Rate this question:
NMAP -sV
NMAP -oS
NMAP -sR
NMAP -O
Rate this question:
Spoof Scan
TCP Connect scan
TCP SYN
Idle Scan
Rate this question:
Site: target.com filetype:xls username password email
Inurl: target.com filename:xls username password email
Domain: target.com archive:xls username password email
Site: target.com file:xls username password email
Rate this question:
Msfpayload
Msfcli
Msfd
Msfvenom
Rate this question:
Risk equation
Threat assessment
BIA equation
Disaster recovery formula
Rate this question:
Social Engineering is the act of publicly disclosing information
Social Engineering is the means put in place by human resource to perform time accounting
Social Engineering is the act of getting needed information from a person rather than breaking into a system
Social Engineering is a training program within sociology studies
Rate this question:
Windows
Unix
Linux
OS X
Rate this question:
Strong passwords
Permissions
Encryption
Education
Rate this question:
Cross-site request forgery
Parameter tampering
SQL injection
XML injection
Rate this question:
White box test
Black box test
Vulnerability assessment
Penetration test
Rate this question:
Spam
Phishing
Pop-ups
Fake Antivirus
Rate this question:
Eavesdropping
Dumpster Diving
Shoulder Surfing
Tailgating
Rate this question:
Plaintext Passwords
FTP file transfers
Encrypted communications sessions
Telnet sessions
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.