Ethical Hacking Practice Test Quiz: Trivia! tests knowledge on cybersecurity essentials, including attack types, hacker roles, and system vulnerabilities. It assesses skills in identifying and mitigating security threats, making it ideal for learners aiming to enhance their defensive hacking capabilities.
NMAP
NIKTO
CAIN ABEL
John the Ripper
Rate this question:
Spam
Phishing
Pop-ups
Fake Antivirus
Rate this question:
Hacktivist
Grey hat Hacker
Black hat Hacker
White hat Hacker
Rate this question:
Ethical Hacker
Grey Hat Hacker
Cyber Terrorist
Script Kiddie
Rate this question:
Cross-site request forgery
Parameter tampering
SQL injection
XML injection
Rate this question:
Day 1 attackÂ
 Zero-day attack
ExploitÂ
Category I attack
Rate this question:
Threat
Exploit
Vulnerability
Attack
Rate this question:
Social Engineering is the act of publicly disclosing information
Social Engineering is the means put in place by human resource to perform time accounting
Social Engineering is the act of getting needed information from a person rather than breaking into a system
Social Engineering is a training program within sociology studies
Rate this question:
Zero-day
Zero-hour
Zero-sum
No-day
Rate this question:
Use fences in the entrance doors.
Install a CCTV with cameras pointing to the entrance doors and the street.
Use an IDS in the entrance doors and install some of them near the corners.
Use lights in all the entrance doors and along the company's perimeter.
Rate this question:
TLS
RSA
GRE
IPSec
Rate this question:
Scanning
Reconnaissance
Escalation
Enumeration
Rate this question:
TCP Connect/Full Open Scan
Half-open Scan
NULL Scan
Xmas Scan
Rate this question:
Nmap -sU
Nmap -sS
Nmap -sM
Nmap -sT
Rate this question:
Social Engineering
Sniffing
Eavesdropping
Scanning
Rate this question:
ScanningÂ
ReconnaissanceÂ
EnumerationÂ
FootprintingÂ
Rate this question:
Internal Whitebox
External, Whitebox
Internal, Blackbox
External, Blackbox
Rate this question:
Risk equation
Threat assessment
BIA equation
Disaster recovery formula
Rate this question:
White box test
Black box test
Vulnerability assessment
Penetration test
Rate this question:
Plaintext Passwords
FTP file transfers
Encrypted communications sessions
Telnet sessions
Rate this question:
Hack attack
Sniffing
Dumpster diving
Spying
Rate this question:
Strong passwords
Permissions
Encryption
Education
Rate this question:
RST
SYN
SYN-ACK
ACK
Rate this question:
Social engineering
Passive FootPrinting
Active FootPrinting
Enumeration
Rate this question:
SQL injection attack
Cross-Site Scripting (XSS)
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
Rate this question:
[cache:]
[site:]
[inurl:]
[link:]
Rate this question:
NMAP -sV
NMAP -oS
NMAP -sR
NMAP -O
Rate this question:
Penetration testing
Social engineering
Vulnerability scanning
Access control list reviews
Rate this question:
Use SSL sites when entering personal information
Use Tor network with multi-node
Use shared WiFi
Use public VPN
Rate this question:
Say no; the friend is not the owner of the account.
Say yes; the friend needs help to gather evidence.
Say yes; do the job for free.
Say no; make sure that the friend knows the risk she's asking the CEH to take.
Rate this question:
Forensic attack
ARP spoofing attack
Social engineering attack
Scanning attack
Rate this question:
Character
Brute Force
Rainbow Tables
Dictionary
Rate this question:
/etc/shadow
SAM file
PASSWORDS file
C:\Windows\system32\shadow
Rate this question:
The internal operation of a system is only partly accessible to the tester.
The internal operation of a system is completely known to the tester.
Only the external operation of a system is accessible to the tester.
Only the internal operation of a system is known to the tester.
Rate this question:
Msfpayload
Msfcli
Msfd
Msfvenom
Rate this question:
Port Scanning
Hacking Active Directory
Privilege Escalation
Shoulder-Surfing
Rate this question:
Eavesdropping
Dumpster Diving
Shoulder Surfing
Tailgating
Rate this question:
-T0
-T5
-O
-A
Rate this question:
SQL injections
Man-in-the-middle
Cross-site scripting
ARP poisoning
Rate this question:
Maltego
Cain & Abel
Metasploit
Wireshark
Rate this question:
Terms of Engagement
Project Scope
Non-Disclosure Agreement
Service Level Agreement
Rate this question:
Windows
Unix
Linux
OS X
Rate this question:
TCP/UDP Port scanning
Firewall detection
OS Detection
Checking if the remote host is alive
Rate this question:
Telnet
FTP
SSH
HTTP
Rate this question:
Gaining access
Escalating privileges
Network mapping
Footprinting
Rate this question:
Spoof Scan
TCP Connect scan
TCP SYN
Idle Scan
Rate this question:
Site: target.com filetype:xls username password email
Inurl: target.com filename:xls username password email
Domain: target.com archive:xls username password email
Site: target.com file:xls username password email
Rate this question:
Suspicion
Trust
Social Obligation
Ignorance
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Ethical Hacking Basics: MCQ Quiz!
Dive into the basics of ethical hacking with this focused MCQ quiz! Assess your understanding of key concepts like malware, ransomware, worms, rootkits, and spyware. Perfect for...
Questions:
10 |
Attempts:
399 |
Last updated:
Mar 21, 2023
|
Ethical Hacking MCQ Quiz! Trivia Test
Does ethical hacking exist? Ethical hacking is performed by a business or person to help identify potential threats on a computer or network. An ethical hacker can get past any...
Questions:
30 |
Attempts:
3927 |
Last updated:
Nov 17, 2024
|
IT Security & Ethical Hacking
This exam is meant for the final module for WCSE
Questions:
132 |
Attempts:
419 |
Last updated:
Mar 20, 2023
|
IT Security And Ethical Hacking
Model Exam Questions for Front runner Program, of ISEH Appin
Questions:
20 |
Attempts:
1111 |
Last updated:
Mar 21, 2023
|
Introduction To Cyber Security With Types Of Hackers
Explore the basics of cyber security, understand different types of hackers, and learn about ethical hacking through simple demonstrations.
Questions:
10 |
Attempts:
535 |
Last updated:
Mar 21, 2023
|
Ethical Hacking Basics: MCQ Quiz!
Dive into the basics of ethical hacking with this focused MCQ quiz! Assess your understanding of key concepts like malware, ransomware, worms, rootkits, and spyware. Perfect for...
Questions:
10 |
Attempts:
399 |
Last updated:
Mar 21, 2023
|
Wait!
Here's an interesting quiz for you.