Cyber attacks and Ethical Hacking MCQs


1.
What is a cyber attack?
A) A physical attack on computers
B) An attempt to damage or gain unauthorized access to a computer system
C) A type of computer hardware
D) A legal software update
Answer: B
2.
Which of the following is considered a cyber attack?
A) Phishing
B) Data backup
C) Software installation
D) Printer setup
Answer: A
3.
What is ethical hacking?
A) Illegal hacking for money
B) Authorized hacking to find system vulnerabilities
C) Destroying computer systems
D) Hiding viruses in software
Answer: B
4.
A person who performs ethical hacking is called:
A) Cracker
B) Hacker
C) White Hat Hacker
D) Spammer
Answer: C
5.
A hacker who illegally breaks into systems is called:
A) White Hat Hacker
B) Black Hat Hacker
C) Blue Hat Hacker
D) Green Hat Hacker
Answer: B
6.
Which type of attack attempts to trick users into revealing personal information?
A) Phishing
B) Sniffing
C) Spoofing
D) DoS
Answer: A
7.
What does DoS stand for?
A) Data Operating System
B) Denial of Service
C) Disk Operating System
D) Digital Output System
Answer: B
8.
Which attack floods a server with traffic to make it unavailable?
A) Phishing
B) DoS attack
C) SQL injection
D) Sniffing
Answer: B
9.
What is malware?
A) A computer game
B) A security tool
C) Malicious software designed to harm systems
D) A type of firewall
Answer: C
10.
Which of the following is a type of malware?
A) Virus
B) Router
C) Keyboard
D) Monitor
Answer: A
11.
A program that replicates itself and spreads to other computers is called:
A) Worm
B) Firewall
C) Switch
D) Patch
Answer: A
12.
A malware that disguises itself as legitimate software is:
A) Trojan Horse
B) Worm
C) Firewall
D) Antivirus
Answer: A
13.
Which attack intercepts data during transmission?
A) Sniffing
B) Formatting
C) Printing
D) Scanning
Answer: A
14.
What is SQL Injection?
A) Hardware upgrade
B) Attack that inserts malicious SQL code into a database query
C) Virus removal technique
D) Backup method
Answer: B
15.
Which attack redirects users to fake websites?
A) Spoofing
B) Debugging
C) Compiling
D) Coding
Answer: A
16.
A fake email that looks legitimate to steal information is called:
A) Phishing email
B) Spam
C) Backup mail
D) System mail
Answer: A
17.
Which tool is commonly used by ethical hackers to scan vulnerabilities?
A) Nmap
B) MS Word
C) Excel
D) Paint
Answer: A
18.
What is penetration testing?
A) Software testing
B) Testing system security by simulating attacks
C) Hardware installation
D) Data entry
Answer: B
19.
Which of the following protects networks from unauthorized access?
A) Firewall
B) Printer
C) Scanner
D) Modem
Answer: A
20.
Which cyber attack locks files and demands payment to unlock them?
A) Spyware
B) Ransomware
C) Worm
D) Trojan
Answer: B
21.
Spyware is used to:
A) Monitor user activity secretly
B) Increase internet speed
C) Install drivers
D) Manage files
Answer: A
22.
Which attack involves sending excessive requests from multiple computers?
A) DDoS attack
B) Phishing attack
C) Sniffing attack
D) Trojan attack
Answer: A
23.
What does DDoS stand for?
A) Distributed Denial of Service
B) Data Denial of System
C) Digital Data Operating System
D) Dynamic Domain Server
Answer: A
24.
Which hacker type hacks systems for learning without causing harm?
A) Grey Hat Hacker
B) Black Hat Hacker
C) Spammer
D) Cracker
Answer: A
25.
Which attack captures keystrokes from a keyboard?
A) Keylogging
B) Phishing
C) Spoofing
D) DoS
Answer: A
26.
A keylogger is used to steal:
A) Passwords
B) Printers
C) Files
D) Hardware
Answer: A
27.
Which type of hacker works for organizations to improve security?
A) Ethical Hacker
B) Cracker
C) Spammer
D) Pirate
Answer: A
28.
Which cyber attack modifies website content illegally?
A) Website defacement
B) Backup attack
C) Firewall attack
D) Cache attack
Answer: A
29.
Which tool helps detect malware?
A) Antivirus
B) Keyboard
C) Monitor
D) Speaker
Answer: A
30.
Which security practice involves regularly updating software?
A) Patching
B) Formatting
C) Debugging
D) Printing
Answer: A
31.
What is social engineering?
A) Physical hacking
B) Manipulating people to obtain confidential information
C) Software development
D) Network installation
Answer: B
32.
Which attack uses fake phone calls to steal information?
A) Vishing
B) Phishing
C) Smishing
D) Sniffing
Answer: A
33.
Which attack uses fake SMS messages?
A) Smishing
B) Phishing
C) Vishing
D) Spoofing
Answer: A
34.
What is a botnet?
A) Network of infected computers controlled by an attacker
B) Antivirus software
C) Network cable
D) Database server
Answer: A
35.
Which malware records user activity and sends it to attackers?
A) Spyware
B) Worm
C) Firewall
D) Patch
Answer: A
36.
Which protocol attack targets password authentication?
A) Brute Force Attack
B) DoS Attack
C) Phishing Attack
D) Sniffing Attack
Answer: A
37.
What is a brute force attack?
A) Guessing passwords repeatedly until correct
B) Sending spam emails
C) Encrypting data
D) Blocking internet
Answer: A
38.
Which security measure uses secret codes to protect data?
A) Encryption
B) Compression
C) Backup
D) Formatting
Answer: A
39.
Which ethical hacking phase identifies system weaknesses?
A) Scanning
B) Reporting
C) Cleaning
D) Testing
Answer: A
40.
Which phase collects information about the target system?
A) Reconnaissance
B) Reporting
C) Encryption
D) Backup
Answer: A
41.
Which ethical hacking step involves documenting findings?
A) Reporting
B) Hacking
C) Scanning
D) Encryption
Answer: A
42.
Which attack alters communication between two parties secretly?
A) Man-in-the-Middle attack
B) Phishing attack
C) Worm attack
D) Trojan attack
Answer: A
43.
Which attack listens to network traffic?
A) Sniffing
B) Coding
C) Formatting
D) Printing
Answer: A
44.
Which device filters incoming and outgoing network traffic?
A) Firewall
B) Router
C) Switch
D) Hub
Answer: A
45.
Which practice helps prevent cyber attacks?
A) Strong passwords
B) Weak passwords
C) Sharing passwords
D) Disabling security
Answer: A
46.
Which malware spreads without human interaction?
A) Worm
B) Trojan
C) Spyware
D) Adware
Answer: A
47.
Which malware displays unwanted advertisements?
A) Adware
B) Virus
C) Worm
D) Trojan
Answer: A
48.
What is the purpose of ethical hacking?
A) Steal data
B) Improve security
C) Damage systems
D) Spread malware
Answer: B
49.
Which organization uses ethical hacking to test system security?
A) Companies
B) Schools only
C) Banks only
D) Individuals only
Answer: A
50.
Cyber security mainly focuses on:
A) Protecting computer systems and data
B) Printing documents
C) Watching videos
D) Playing games
Answer: A

Leave a Comment