Cyber attacks and Ethical Hacking MCQs

  1. What is a logic bomb?
    A) Hardware failure
    B) Malicious code triggered by condition
    C) Backup tool
    D) Firewall
    Answer: B
  2. What is phishing commonly used for?
    A) System repair
    B) Stealing sensitive information
    C) Data backup
    D) File compression
    Answer: B
  3. Which attack involves redirecting users to fake sites?
    A) Spoofing
    B) Backup
    C) Patch
    D) Encryption
    Answer: A
  4. What is sniffing?
    A) Monitoring network traffic
    B) Deleting files
    C) Backup
    D) Formatting disk
    Answer: A
  5. What is ethical hacking permission called?
    A) Illegal access
    B) Authorization
    C) Spoofing
    D) Cracking
    Answer: B
  6. Which tool is used for password cracking?
    A) John the Ripper
    B) Paint
    C) Excel
    D) Word
    Answer: A
  7. What is hash function used for?
    A) Encrypting data
    B) Converting data into fixed value
    C) Deleting files
    D) Backup
    Answer: B
  8. What is salting in passwords?
    A) Weakening security
    B) Adding random data to passwords
    C) Removing password
    D) Backup
    Answer: B
  9. What is phishing attack example?
    A) Fake bank email
    B) System update
    C) Backup
    D) Antivirus
    Answer: A
  10. What is network security?
    A) Protecting network from attacks
    B) Deleting files
    C) Backup
    D) Programming
    Answer: A
  11. What is vulnerability assessment?
    A) System repair
    B) Identifying weaknesses
    C) Backup
    D) Encryption
    Answer: B
  12. What is exploit?
    A) Security patch
    B) Code that takes advantage of vulnerability
    C) Backup
    D) Antivirus
    Answer: B
  13. Which attack steals cookies?
    A) Session hijacking
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  14. What is ARP spoofing?
    A) Fake MAC-IP mapping
    B) Backup
    C) Encryption
    D) Hardware
    Answer: A
  15. What is DNS spoofing?
    A) Fake DNS response
    B) Backup
    C) Update
    D) Antivirus
    Answer: A
  16. What is backdoor?
    A) Secret access method
    B) Firewall
    C) Backup
    D) Patch
    Answer: A
  17. What is cyber espionage?
    A) Legal work
    B) Stealing confidential data
    C) Backup
    D) Programming
    Answer: B
  18. What is hacktivism?
    A) Hacking for political/social cause
    B) Backup
    C) Programming
    D) Antivirus
    Answer: A
  19. What is password policy?
    A) Rules for passwords
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  20. What is penetration test phase 1?
    A) Exploitation
    B) Reconnaissance
    C) Reporting
    D) Cleanup
    Answer: B
  21. What is reconnaissance?
    A) Gathering information
    B) Deleting files
    C) Backup
    D) Encryption
    Answer: A
  22. What is scanning phase?
    A) Finding open ports
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  23. What is exploitation phase?
    A) Using vulnerabilities
    B) Backup
    C) Update
    D) Antivirus
    Answer: A
  24. What is reporting phase?
    A) Documenting results
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  25. What is footprinting?
    A) Collecting target info
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  26. What is vulnerability management?
    A) Fixing weaknesses
    B) Backup
    C) Encryption
    D) Programming
    Answer: A
  27. What is ethical hacker skill?
    A) Coding knowledge
    B) Painting
    C) Singing
    D) Drawing
    Answer: A
  28. What is social engineering example?
    A) Pretending IT staff
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  29. What is phishing SMS called?
    A) Smishing
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  30. What is voice phishing called?
    A) Vishing
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  31. What is data encryption standard?
    A) DES
    B) CPU
    C) RAM
    D) UPS
    Answer: A
  32. What is AES?
    A) Advanced Encryption Standard
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  33. What is HTTPS?
    A) Secure protocol
    B) Virus
    C) Hardware
    D) Backup
    Answer: A
  34. What is SSL?
    A) Security layer protocol
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  35. What is digital signature?
    A) Electronic authentication
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  36. What is cyber warfare?
    A) Online conflict
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  37. What is identity theft?
    A) Stealing personal identity
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  38. What is spam?
    A) Unwanted emails
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  39. What is firewall type?
    A) Packet filtering
    B) Backup
    C) Patch
    D) CPU
    Answer: A
  40. What is IDS?
    A) Intrusion Detection System
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  41. What is IPS?
    A) Intrusion Prevention System
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  42. What is honeypot?
    A) Trap system for attackers
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  43. What is cyber threat?
    A) Potential attack
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  44. What is risk assessment?
    A) Evaluating threats
    B) Backup
    C) Patch
    D) Firewall
    Answer: A
  45. What is ethical hacking rule?
    A) Permission required
    B) No rules
    C) Illegal access
    D) Hiding identity
    Answer: A
  46. What is vulnerability patch?
    A) Fix for security flaw
    B) Backup
    C) Virus
    D) Hardware
    Answer: A
  47. What is cyber defense?
    A) Protecting systems
    B) Backup
    C) Patch
    D) Programming
    Answer: A
  48. What is digital forensics?
    A) Investigating cyber crimes
    B) Backup
    C) Patch
    D) Hardware
    Answer: A
  49. What is ethical hacking benefit?
    A) Improved security
    B) Data loss
    C) Virus
    D) Attack
    Answer: A
  50. What is safest practice online?
    A) Sharing passwords
    B) Using strong security measures
    C) Ignoring updates
    D) No antivirus
    Answer: B

Leave a Comment