Ethical Hacking MCQ Quiz! Trivia Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kalpna
K
Kalpna
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,941
| Attempts: 3,941 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. SQL is a?

Explanation

Structured Query Language (SQL) is a programming language used for managing and manipulating relational databases. It is designed to create, retrieve, update, and delete data from a database, as well as define and manipulate the structure of the database itself. SQL is a standardized language that provides a set of commands and syntax for interacting with databases, making it easier to communicate with and manage data in a structured manner. Therefore, the correct answer is Structured Query Language.

Submit
Please wait...
About This Quiz
Ethical Hacking MCQ Quiz! Trivia Test - Quiz


Does ethical hacking exist? Ethical hacking is performed by a business or person to help identify potential threats on a computer or network. An ethical hacker can get... see morepast any security in place to see any malicious hacking that has occurred. An ethical hacker legally checks to make sure there are no weaknesses in the system. This awesome quiz on ethical hacking will show you that not all hackers mean to cause harm. see less

2. NMAP is a?

Explanation

NMAP is a network scanner. It is a powerful tool used for network exploration and security auditing. It helps in discovering hosts and services on a computer network, thus providing information about open ports, operating systems, and vulnerabilities. NMAP can be used for both legitimate network administration purposes and malicious activities, making it an essential tool for network administrators and hackers alike.

Submit
3. Wireshark can be used to?

Explanation

Wireshark is a network protocol analyzer that allows users to capture and analyze network packets. It helps in monitoring and troubleshooting network issues by capturing data packets, analyzing their contents, and providing detailed information about network traffic. Wireshark can decode various protocols and display the information in a readable format, making it a valuable tool for network administrators and security professionals to analyze network traffic and identify any potential issues or security threats.

Submit
4. What is the command to launch METASPLOIT ?

Explanation

The correct answer is "msfconsole." This is the command used to launch METASPLOIT, a popular penetration testing framework. It provides a command-line interface for interacting with various modules and tools within METASPLOIT, allowing users to perform security testing and exploit development.

Submit
5. Filezilla is a?

Explanation

Filezilla is a popular software program used for transferring files between a client computer and a server over a network. It supports the File Transfer Protocol (FTP), which is specifically designed for file transfer purposes. Therefore, Filezilla is categorized as an FTP client, allowing users to connect to FTP servers, browse directories, upload and download files, and manage their file transfers efficiently.

Submit
6. Which command attacks the target machine?

Explanation

The command "exploit" is the correct answer because it refers to a specific action of taking advantage of vulnerabilities or weaknesses in a system to gain unauthorized access or cause harm. The other options - attack, offense, and hack - are more general terms that can encompass various actions, but "exploit" specifically relates to targeting and compromising a target machine.

Submit
7. Default Password for Kali Linux 2020.1 is?

Explanation

The default password for Kali Linux 2020.1 is "kali".

Submit
8. Default Port for FTP is?

Explanation

The default port for FTP (File Transfer Protocol) is 21. FTP is a standard network protocol used for transferring files between a client and a server on a computer network. The client initiates a connection to the server on port 21, and this port is reserved specifically for FTP communication.

Submit
9. Which is the correct command to change the MAC Address for Ethernet Adapter?

Explanation

The correct command to change the MAC Address for Ethernet Adapter is "ifconfig eth0 hw ether 11:22:03:02:ab:bb". This command uses the "ifconfig" command to configure network interfaces, specifically targeting the "eth0" interface and specifying the desired MAC Address as "11:22:03:02:ab:bb".

Submit
10. Command to List IP Address of all available Network Interfaces.

Explanation

The correct answer is "ifconfig". This command is used to list the IP addresses of all available network interfaces in Unix-like operating systems. It provides detailed information about the network interfaces, including their IP addresses, netmasks, and other configuration settings.

Submit
11. Command to Display Options in Metasploit?

Explanation

The correct answer is "show options". This command is used in the Metasploit framework to display the available options for a specific module or exploit. It allows the user to view and modify the various parameters and settings associated with the selected module, providing a comprehensive overview of the available options for customization.

Submit
12. Can we perform SQL Injection using XXS?

Explanation



SQL Injection cannot be performed using XSS, as they involve different mechanisms and targets. XSS could potentially be used to steal a user's session cookie, which might give access to perform actions that could lead to SQL Injection if the application is also vulnerable to it, but XSS itself does not directly enable SQL Injection.
Submit
13. Command to sniff packets in Bettercap is?

Explanation

The correct answer is "net.sniff" because Bettercap is a powerful network security tool that allows users to perform various tasks, including packet sniffing. The "net.sniff" command specifically enables packet sniffing functionality in Bettercap, allowing users to capture and analyze network traffic for security or troubleshooting purposes.

Submit
14. ARP Spoofing is?

Explanation

ARP spoofing is a type of attack where an attacker sends fake Address Resolution Protocol (ARP) messages to the local network. By doing so, the attacker can associate their own MAC address with the IP address of another device on the network, causing network traffic to be redirected to the attacker's machine. This allows the attacker to intercept and manipulate the communication between the targeted devices, making it a man-in-the-middle attack.

Submit
15. What is the command to list payloads in Metasploit?

Explanation

The correct command to list payloads in Metasploit is "show payloads". This command allows the user to view and access the available payloads in the Metasploit framework. By using this command, the user can easily browse through the various payloads and select the appropriate one for their specific needs.

Submit
16. Command To launch The Veil Framework?

Explanation

The correct answer is "./Veil.py" because it specifies the correct command to launch the Veil Framework. The "./" in front of "Veil.py" indicates that the command should be executed from the current directory.

Submit
17. Number of Hosts we can assign in Class C IP Address Range.

Explanation

In a Class C IP address range, the first three octets are fixed, leaving only the last octet available for host assignment. Since an octet can have values ranging from 0 to 255, there are 256 possible values. However, the first and last values are reserved for network and broadcast addresses respectively, so they cannot be assigned to hosts. Therefore, the number of hosts that can be assigned in a Class C IP address range is 256-2, which equals 254.

Submit
18. Which is a correct bettercap command?

Explanation

The correct bettercap command is "bettercap -iface eth0". This command specifies the interface to be used for bettercap, in this case, "eth0". The "-iface" flag is used to indicate the interface, and "eth0" is the specific interface being referenced.

Submit
19. XSS is a

Explanation

A client-side attack refers to a type of cyber attack that targets vulnerabilities in the client-side components of a system, such as web browsers or applications. These attacks exploit weaknesses in the client-side software to gain unauthorized access, steal information, or compromise the system. Examples of client-side attacks include phishing, drive-by downloads, and malicious email attachments. In this context, XSS (Cross-Site Scripting) is a type of client-side attack where attackers inject malicious scripts into web pages viewed by users, allowing them to execute arbitrary code and potentially steal sensitive information.

Submit
20. In a reverse connection which command is the most necessary?

Explanation

The most necessary command in a reverse connection is "set LHOST IP_ADDRESS". This command is used to set the local host IP address, which is the IP address of the machine where the reverse connection will be initiated from. Without setting the correct LHOST IP address, the reverse connection will not be able to establish a connection with the remote host.

Submit
21. Which of the following is NOT a common type of ethical hacking assessment?

Explanation

Ethical hacking assessments aim to identify and address security vulnerabilities in systems and networks. Penetration testing involves simulating real-world attacks to exploit vulnerabilities. Vulnerability scanning automates the process of identifying weaknesses. Social engineering uses psychological manipulation to gain access to information or systems. DDoS (Distributed Denial of Service) attacks, however, are malicious attempts to disrupt the availability of a service or network, and they are not considered an ethical hacking practice.

Submit
22. Routers MAC Address is returned by?

Explanation

The BSSID (Basic Service Set Identifier) is a unique identifier assigned to each wireless access point (WAP) in a wireless network. It is the MAC (Media Access Control) address of the WAP. When a router's MAC address is returned, it is actually referring to the BSSID. The BSSID is used to differentiate between different access points in a network and is essential for devices to connect to the correct WAP.

Submit
23. Oracle VM VirtualBox provides up to ________________ virtual PCI Ethernet cards for each virtual machine.

Explanation

Oracle VM VirtualBox provides up to 8 virtual PCI Ethernet cards for each virtual machine. This means that users can create and configure up to 8 virtual network interfaces in each virtual machine, allowing for greater flexibility and connectivity options within the virtual environment. Having multiple virtual Ethernet cards enables users to connect their virtual machines to different networks or to create complex network configurations within the virtual environment.

Submit
24. What is the payload in Metasploit?

Explanation

The payload in Metasploit refers to a piece of code that is delivered to a target system after a successful exploitation. It is designed to perform specific actions on the compromised system, such as gaining remote access, executing commands, or collecting data. The payload is a crucial component of a successful attack as it allows the attacker to maintain control over the compromised system and carry out further malicious activities.

Submit
25. Which Networking Modes does not allow VM1 to connect with VM2 and vice versa?

Explanation

NAT (Network Address Translation) networking mode does not allow VM1 to connect with VM2 and vice versa. In NAT mode, the virtual machines are connected to a private network, and their network traffic is translated by the host computer's network interface. This means that VM1 and VM2 cannot directly communicate with each other as they are isolated within their own private networks.

Submit
26. Which command can be used to sniff wireless networks in range?

Explanation

Airodump-ng is the correct answer because it is a command-line tool used for capturing and analyzing packets on wireless networks. It can be used to sniff wireless networks in range by capturing the packets transmitted over the network and displaying information such as MAC addresses, signal strength, and data rates. Airodump-ng is a part of the Aircrack-ng suite, which is a set of tools used for auditing wireless networks.

Submit
27. Which tool detects ARP Spoofing?

Explanation

XARP is a tool that can detect ARP Spoofing. ARP Spoofing is a technique used by attackers to intercept network traffic by sending fake Address Resolution Protocol (ARP) messages. XARP is specifically designed to monitor and detect these ARP Spoofing attacks. It analyzes the network traffic and compares the IP-MAC address pairs to identify any inconsistencies or discrepancies that may indicate a spoofing attempt. Therefore, XARP is the correct tool to detect ARP Spoofing.

Submit
28. Which command is correct for ARP SPOOFING using Bettercap?

Explanation

The correct command for ARP SPOOFING using Bettercap is "arp.spoof on". This command enables the ARP spoofing functionality in Bettercap, allowing the user to intercept and manipulate network traffic by poisoning the ARP table of targeted devices.

Submit
29. Which is the correct command to Select a Database?

Explanation

The correct command to select a database is "USE DATABASE_NAME;". This command is used to switch to a specific database in order to perform operations on it. The "USE" keyword is followed by the name of the database you want to select, and the semicolon at the end signifies the end of the command.

Submit
30. What is the command to list all caplets in Bettercap?

Explanation

The correct answer is "caplets.show". This command is used in Bettercap to list all the caplets, which are scripts or modules that can be used to extend the functionality of Bettercap. By running this command, users can view a list of all available caplets and choose which ones to use for their specific needs.

Submit
View My Results

Quiz Review Timeline (Updated): Nov 17, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 17, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2020
    Quiz Created by
    Kalpna
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
SQL is a?
NMAP is a?
Wireshark can be used to?
What is the command to launch METASPLOIT ?
Filezilla is a?
Which command attacks the target machine?
Default Password for Kali Linux 2020.1 is?
Default Port for FTP is?
Which is the correct command to change the MAC Address for Ethernet...
Command to List IP Address of all available Network Interfaces.
Command to Display Options in Metasploit?
Can we perform SQL Injection using XXS?
Command to sniff packets in Bettercap is?
ARP Spoofing is?
What is the command to list payloads in Metasploit?
Command To launch The Veil Framework?
Number of Hosts we can assign in Class C IP Address Range.
Which is a correct bettercap command?
XSS is a
In a reverse connection which command is the most necessary?
Which of the following is NOT a common type of ethical hacking...
Routers MAC Address is returned by?
Oracle VM VirtualBox provides up to ________________ virtual PCI...
What is the payload in Metasploit?
Which Networking Modes does not allow VM1 to connect with VM2 and vice...
Which command can be used to sniff wireless networks in range?
Which tool detects ARP Spoofing?
Which command is correct for ARP SPOOFING using Bettercap?
Which is the correct command to Select a Database?
What is the command to list all caplets in Bettercap?
Alert!

Advertisement