Search Header Logo

Cybersecurity & Ethical Hacking Quiz

Authored by Gamkers Official

Computers

University

Used 12+ times

Cybersecurity & Ethical Hacking Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary objective of ethical hacking?

To exploit vulnerabilities for financial gain

To prevent and protect systems from being hacked

To steal confidential information

To deface websites

Answer explanation

The primary objective of ethical hacking is to prevent and protect systems from being hacked. Ethical hackers identify vulnerabilities to strengthen security, unlike malicious hackers who exploit them for personal gain.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a type of malware?

Virus

Worm

Keylogger

Firewall

Answer explanation

A firewall is not a type of malware; it is a security system that monitors and controls incoming and outgoing network traffic. In contrast, a virus, worm, and keylogger are all types of malware designed to harm or exploit systems.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a DDoS attack?

Distributed Denial of Service

Data Disruption Over System

Data Duplication and System Overload

Data Destruction on Open Servers

Answer explanation

A DDoS attack stands for Distributed Denial of Service. It involves multiple systems overwhelming a target server, making it unavailable to users. The other options do not accurately describe this type of cyber attack.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common tool used for network sniffing?

Metasploit

Wireshark

Nmap

John the Ripper

Answer explanation

Wireshark is a widely used network protocol analyzer that captures and displays data packets in real-time, making it a common tool for network sniffing. The other options serve different purposes.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is "social engineering" in the context of hacking?

A technique used to exploit software vulnerabilities

Manipulating people into providing sensitive information

Bypassing firewalls and antivirus software

A type of malware that targets social media platforms

Answer explanation

Social engineering involves manipulating individuals to divulge confidential information, making 'Manipulating people into providing sensitive information' the correct choice. It focuses on human interaction rather than technical exploits.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does the tool Nmap primarily do?

Network scanning

Password cracking

File encryption

Malware analysis

Answer explanation

Nmap is a powerful tool used for network scanning, allowing users to discover hosts and services on a computer network. It does not perform password cracking, file encryption, or malware analysis.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a method of password cracking?

SQL Injection

Brute Force Attack

Cross-Site Scripting (XSS)

DDoS Attack

Answer explanation

A Brute Force Attack is a method of password cracking where an attacker systematically tries all possible combinations of passwords until the correct one is found. The other options are not methods for cracking passwords.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?