Search Header Logo

Introduction to Ethical Hacking

Authored by Leena Namboothiri

Information Technology (IT)

University

Introduction to Ethical Hacking
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes ethical hacking in a professional cybersecurity context?

Authorized simulations to assess security weaknesses

Passive monitoring of network traffic for trends

Unauthorized probing to find exploitable flaws

Routine system maintenance and software updates

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action best exemplifies spoofing in a cybersecurity context?

Encrypting files to protect sensitive data

Sending forged emails with a fake sender identity

Flooding a server with excessive traffic requests

Probing a host to discover open network ports

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option best describes a back door in software security?

An antivirus feature scanning for malware signatures

A network firewall blocking unauthorized connections

A hidden mechanism bypassing standard authentication

An official login page requiring normal credentials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker disguises malicious code inside a legitimate installer. What method of gaining access is being used?

Trojan horse masquerading as trusted software

Password guessing on the normal login screen

Side channel attack exploiting timing leakage

Back door left for debugging and diagnostics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example is a side-channel attack relying on indirect leakage from hardware behavior?

Power analysis of CPU consumption to infer keys

WiFi packet sniffing for session tokens

Phishing with urgent password reset emails

USB drop in office parking areas

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To estimate an encryption key without breaking the algorithm directly, which method applies?

Perform ARP spoofing to impersonate a gateway

Measure encryption timing variations per operation

Send spoofed emails requesting login credentials

Leave infected USB drives in common areas

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action best aligns with legal ethical hacking practice before conducting tests?

Access a network without prior approval

Search current laws and local regulations

Install test malware on target systems

Launch limited DoS to gauge resilience

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?