Sample Questions and Answers
What does the term “black box testing” refer to?
Testing without knowledge of internal workings
B. Testing with full access to source code
C. Automated vulnerability scanning
D. Penetration testing only
Answer: A
Explanation: Black box testing assesses functionality without access to internal design.
Which command is used in Windows to display the routing table?
route print
B. ipconfig /all
C. netstat -r
D. tracert
Answer: A
Explanation: route print displays the current routing table.
What is a botnet?
A network of compromised computers controlled by an attacker
B. A firewall technology
C. A data encryption technique
D. A software patch
Answer: A
Explanation: Botnets are used to launch large-scale attacks like DDoS.
What is the main purpose of an IDS (Intrusion Detection System)?
To monitor and detect malicious activities
B. To block all incoming traffic
C. To encrypt data
D. To scan for viruses
Answer: A
Explanation: IDS monitors network or system activities for suspicious behavior.
What does “ethical hacking” mean?
Authorized testing to find vulnerabilities
B. Illegal hacking activities
C. Creating malware
D. Bypassing firewalls without permission
Answer: A
Explanation: Ethical hacking involves permissioned security assessments.
Which attack exploits buffer overflow vulnerabilities to gain control of a system?
Code Injection
B. Phishing
C. Brute Force
D. Man-in-the-Middle
Answer: A
Explanation: Code injection exploits overflow to run arbitrary code.
What type of attack involves intercepting and altering communication between two parties without their knowledge?
Man-in-the-Middle (MITM)
B. Phishing
C. DNS Spoofing
D. Social Engineering
Answer: A
Explanation: MITM attacks allow an attacker to eavesdrop or modify communications covertly.
Which of the following is a common method used to prevent replay attacks?
Using Nonces or Timestamps
B. Password Complexity
C. Encryption Only
D. Disabling Ports
Answer: A
Explanation: Nonces or timestamps ensure that old communications cannot be reused.
What is the main goal of social engineering attacks?
Manipulating people to disclose confidential information
B. Scanning networks
C. Infecting systems with malware
D. Overloading a server
Answer: A
Explanation: Social engineering exploits human psychology to gain unauthorized access.
Which tool is commonly used for automated vulnerability scanning?
Nessus
B. Metasploit
C. Wireshark
D. Nmap
Answer: A
Explanation: Nessus scans systems for vulnerabilities and provides detailed reports.
What does the acronym RAT stand for in cybersecurity?
Remote Access Trojan
B. Real-time Antivirus Tool
C. Rapid Attack Technique
D. Root Access Tool
Answer: A
Explanation: RATs allow attackers remote control over an infected machine.
Which protocol is considered more secure for email transmission?
SMTP with STARTTLS
B. POP3
C. IMAP
D. FTP
Answer: A
Explanation: STARTTLS upgrades SMTP connections to use encryption, securing email transmission.
What is a honeypot in cybersecurity?
A decoy system designed to attract attackers
B. A firewall configuration
C. An encryption algorithm
D. A password cracking tool
Answer: A
Explanation: Honeypots are traps to detect, deflect, or study hacking attempts.
Which layer of the OSI model is responsible for end-to-end communication?
Transport Layer
B. Network Layer
C. Data Link Layer
D. Session Layer
Answer: A
Explanation: The Transport Layer manages data delivery between hosts.
What type of firewall filters traffic based on application-level data?
Application Layer Firewall
B. Packet Filtering Firewall
C. Stateful Firewall
D. Circuit-level Gateway
Answer: A
Explanation: Application layer firewalls inspect data within the application payload.
What is the key characteristic of a zero-day exploit?
Exploits a previously unknown vulnerability
B. Uses known vulnerabilities only
C. Requires user interaction
D. Is always detected by antivirus software
Answer: A
Explanation: Zero-day exploits target vulnerabilities that are not yet patched or publicly known.
What does the term “pharming” mean?
Redirecting users to fraudulent websites without their knowledge
B. Sending phishing emails
C. Exploiting SQL vulnerabilities
D. Installing ransomware
Answer: A
Explanation: Pharming manipulates DNS or host files to redirect users to malicious sites.
What is the main purpose of SSL/TLS?
To provide encryption and secure communication over networks
B. To scan for malware
C. To block unauthorized ports
D. To monitor network traffic
Answer: A
Explanation: SSL/TLS encrypts data between clients and servers to ensure confidentiality.
What does the term “salting” mean in password security?
Adding random data to passwords before hashing
B. Encrypting passwords using RSA
C. Storing passwords in plaintext
D. Using the same password for multiple accounts
Answer: A
Explanation: Salting protects against rainbow table attacks by adding randomness to passwords before hashing.
What is the main difference between a virus and a worm?
Worms can self-replicate and spread without user action; viruses need user action to spread
B. Viruses self-replicate; worms require user action
C. Both require user action
D. Worms only affect mobile devices
Answer: A
Explanation: Worms spread independently across networks, while viruses typically need to be executed by users.
What does the acronym DLP stand for in cybersecurity?
Data Loss Prevention
B. Digital Logic Protocol
C. Distributed Log Processor
D. Domain Level Protection
Answer: A
Explanation: DLP solutions help prevent sensitive data from being leaked or lost.
What is a primary characteristic of a buffer overflow attack?
Overwriting adjacent memory, potentially executing arbitrary code
B. Overloading the CPU with requests
C. Capturing network packets
D. Scanning open ports
Answer: A
Explanation: Buffer overflow attacks exploit improper memory handling to execute malicious code.
Which of the following is an example of two-factor authentication?
Password and SMS code
B. Username and password
C. Security question only
D. Fingerprint only
Answer: A
Explanation: Two-factor authentication requires two different authentication methods.
What does the term “cross-site request forgery” (CSRF) mean?
Forcing a user to execute unwanted actions on a web application they are authenticated on
B. Injecting malicious SQL commands
C. Phishing attack via email
D. Scanning open ports on a server
Answer: A
Explanation: CSRF tricks a user’s browser into submitting unauthorized requests.
Which encryption algorithm is symmetric?
AES
B. RSA
C. ECC
D. DSA
Answer: A
Explanation: AES uses the same key for encryption and decryption (symmetric).
What is the main function of a proxy server in network security?
Acts as an intermediary to filter requests between clients and servers
B. Encrypts network traffic
C. Scans for malware
D. Monitors user activity
Answer: A
Explanation: Proxy servers control and filter traffic, often used for caching and anonymity.
What is a typical sign of a denial-of-service (DoS) attack?
Network or service becomes unavailable due to overwhelming traffic
B. Passwords are stolen
C. Malware infection
D. Data encryption
Answer: A
Explanation: DoS attacks overload a system, making services inaccessible.
What kind of attack exploits flaws in DNS to redirect traffic?
DNS Spoofing
B. Man-in-the-Middle
C. Brute Force
D. SQL Injection
Answer: A
Explanation: DNS spoofing modifies DNS responses to redirect users to malicious sites.
Which of the following is a form of wireless encryption protocol?
WPA2
B. FTP
C. HTTP
D. SMTP
Answer: A
Explanation: WPA2 secures wireless communications by encrypting data.
What is the main advantage of using Public Key Infrastructure (PKI)?
It enables secure key exchange and digital signatures using asymmetric cryptography
B. It speeds up network traffic
C. It protects against malware
D. It is used to scan networks
Answer: A
Explanation: PKI manages digital certificates and public/private keys for secure communication.
Which of the following tools can be used for packet sniffing?
Wireshark
B. Metasploit
C. John the Ripper
D. Nessus
Answer: A
Explanation: Wireshark captures and analyzes network packets.
What does “footprinting” mean in the context of ethical hacking?
Gathering information about a target system before attacking
B. Encrypting data
C. Injecting malicious code
D. Blocking network traffic
Answer: A
Explanation: Footprinting is the reconnaissance phase to collect target information.
Which of the following is a characteristic of ransomware?
Encrypts data and demands payment for decryption
B. Self-replicates across networks
C. Records keystrokes
D. Scans for open ports
Answer: A
Explanation: Ransomware denies access to data until a ransom is paid.
What does “ARP poisoning” attack target?
The Address Resolution Protocol to intercept traffic
B. DNS servers
C. Email systems
D. Firewall configurations
Answer: A
Explanation: ARP poisoning tricks a network into sending traffic to the attacker.
What is the main function of a SIEM system?
Collects and analyzes security event data from multiple sources
B. Encrypts files
C. Scans for vulnerabilities
D. Manages user passwords
Answer: A
Explanation: Security Information and Event Management (SIEM) provides real-time analysis.
Which of the following is a common use of the Metasploit Framework?
Exploitation of vulnerabilities to test system security
B. Packet sniffing
C. Encrypting data
D. Managing firewalls
Answer: A
Explanation: Metasploit is a penetration testing tool used to develop and execute exploits.
Reviews
There are no reviews yet.