Unit 1 - Practice Quiz

INT244

1 What is the primary difference between a 'Black Hat' hacker and a 'White Hat' hacker?

A. Technical skill level
B. Authorization and intent
C. The operating system used
D. The age of the hacker

2 Which term refers to the pre-computer era practice of manipulating telephone networks?

A. Phishing
B. Phreaking
C. Spoofing
D. Sniffing

3 Which phase of the ethical hacking methodology involves gathering information about a target without directly interacting with it?

A. Active Scanning
B. Passive Reconnaissance
C. Gaining Access
D. Enumeration

4 In the context of hacking methodologies, what is the primary goal of 'Clearing Tracks'?

A. To install a backdoor
B. To steal data
C. To avoid detection and maintain access
D. To crash the system

5 Which type of penetration testing is performed with no prior knowledge of the target system?

A. White Box
B. Black Box
C. Gray Box
D. Crystal Box

6 What is the specific legal requirement that distinguishes an ethical hacker from a malicious hacker?

A. A Certified Ethical Hacker (CEH) certification
B. Written permission from the owner
C. Using Linux exclusively
D. Only hacking during business hours

7 Which OSI model layer is primarily responsible for logical addressing and routing?

A. Layer 2 (Data Link)
B. Layer 3 (Network)
C. Layer 4 (Transport)
D. Layer 7 (Application)

8 Which protocol is connection-oriented and ensures reliable data delivery?

A. UDP
B. IP
C. TCP
D. ICMP

9 Which TCP/IP port is the default for unencrypted web traffic (HTTP)?

A. Port 21
B. Port 22
C. Port 80
D. Port 443

10 Which port would an administrator typically use for secure remote command-line access to a Linux server?

A. Port 23 (Telnet)
B. Port 22 (SSH)
C. Port 25 (SMTP)
D. Port 110 (POP3)

11 What is the primary function of the Domain Name System (DNS) running on Port 53?

A. Assigning IP addresses to devices
B. Resolving domain names to IP addresses
C. Transferring files
D. Sending emails

12 How does a network switch differ from a network hub?

A. A switch broadcasts data to all ports.
B. A switch sends data only to the specific recipient MAC address.
C. A switch cannot connect multiple devices.
D. A switch operates at Layer 3.

13 What is a 'broadcast domain'?

A. A group of devices that receive broadcast frames originating from any device in the group
B. A domain used for TV broadcasting
C. A specific IP address range for servers
D. The range of a WiFi signal

14 What is the primary role of a Proxy Server?

A. To route packets between different networks
B. To act as an intermediary between a client and a server
C. To physically connect cables
D. To generate encryption keys

15 Which type of firewall filters traffic based on source, destination, port, and protocol without tracking the state of connections?

A. Stateful Inspection Firewall
B. Packet Filtering Firewall
C. Application Gateway
D. Next-Generation Firewall

16 What is a DMZ (Demilitarized Zone) in network security?

A. A network segment with no security
B. A sub-network that exposes external-facing services to an untrusted network
C. A zone where military software is tested
D. An encrypted tunnel

17 Which file system is native to the Windows Operating System?

A. EXT4
B. NTFS
C. HFS+
D. APFS

18 The Android operating system is based on which kernel?

A. Windows NT
B. Linux Kernel
C. Darwin
D. Hybrid Kernel

19 In Linux, which user account has unrestricted access to all commands and files?

A. Admin
B. SuperUser
C. Root
D. System

20 Which component in Windows stores low-level settings for the OS and installed applications?

A. System32
B. The Registry
C. Kernel
D. Active Directory

21 The Caesar Cipher is an example of which type of cryptography?

A. Asymmetric Encryption
B. Substitution Cipher
C. Transposition Cipher
D. Hashing

22 Which machine was used by the Germans in WWII for encryption and famously broken by Alan Turing?

A. The Colossus
B. The Enigma
C. The Lorenz
D. The Sigaba

23 In Symmetric Cryptography, how many keys are used for the encryption and decryption process?

A. One
B. Two
C. Three
D. Four

24 Which of the following is a symmetric encryption algorithm?

A. RSA
B. AES
C. ECC
D. Diffie-Hellman

25 What is a major disadvantage of Symmetric Cryptography?

A. It is slower than asymmetric cryptography.
B. It increases file size.
C. Key distribution and sharing is difficult.
D. It cannot be implemented on mobile devices.

26 Asymmetric Cryptography is also known as:

A. Secret-key cryptography
B. Public-key cryptography
C. One-way cryptography
D. Block cipher

27 In an asymmetric encryption scenario, if Alice wants to send a confidential message to Bob, which key does she use to encrypt the message?

A. Alice's Private Key
B. Alice's Public Key
C. Bob's Public Key
D. Bob's Private Key

28 Which algorithm is a widely used Asymmetric cryptosystem?

A. DES
B. AES
C. RSA
D. 3DES

29 What is the primary purpose of a Hashing algorithm?

A. To encrypt data for confidentiality
B. To compress data
C. To verify data integrity
D. To create a communication tunnel

30 Which of the following is a characteristic of a secure hash function?

A. It is reversible (two-way).
B. It uses two keys.
C. It is a one-way function.
D. It produces variable length output.

31 What is a 'Collision' in the context of hashing?

A. When two different inputs produce the same hash output
B. When a hash function crashes
C. When encryption and decryption happen simultaneously
D. When data is lost during hashing

32 Which hashing algorithm is considered insecure today due to collision vulnerabilities?

A. SHA-256
B. SHA-3
C. MD5
D. Whirlpool

33 What is the 'Man-in-the-Middle' (MITM) attack in the context of cryptography?

A. An attacker guessing the password
B. An attacker physically stealing the server
C. An attacker intercepting and possibly altering communications between two parties
D. An attacker deleting the database

34 IPsec is primarily used to secure which type of connection?

A. Email transmission
B. File storage
C. Virtual Private Networks (VPNs)
D. Web browsing (HTTPS)

35 What are the two main modes of operation for IPsec?

A. Open and Closed
B. Tunnel and Transport
C. Public and Private
D. Block and Stream

36 What is PGP (Pretty Good Privacy) primarily used for?

A. Securing hard drives
B. Securing email communications
C. Securing WiFi passwords
D. Securing routing tables

37 Which protocol succeeded SSL (Secure Sockets Layer) to provide secure web browsing?

A. TLS (Transport Layer Security)
B. SSH
C. IPsec
D. HTTP

38 What is the purpose of a Digital Signature?

A. To encrypt the message
B. To hide the message
C. To verify authenticity and non-repudiation
D. To compress the message

39 In the context of SSL/TLS, what role does a Certificate Authority (CA) play?

A. It encrypts the traffic.
B. It acts as a trusted third party that issues digital certificates.
C. It hosts the website.
D. It creates the HTML content.

40 Which cryptographic concept refers to hiding a secret message within an ordinary file, like an image?

A. Cryptography
B. Steganography
C. Hashing
D. Obfuscation

41 Which phase of hacking involves scanning the network for specific IP addresses and open ports?

A. Reconnaissance
B. Scanning
C. Gaining Access
D. Maintaining Access

42 What is a 'Gray Hat' hacker?

A. Someone who hacks for government agencies
B. Someone who hacks without permission but often without malicious intent, and may disclose vulnerabilities to the owner
C. A hacker who is retired
D. A hacker who only uses old hardware

43 In a TCP header, which flag is used to initiate a connection?

A. FIN
B. ACK
C. SYN
D. RST

44 Which network device operates at Layer 1 (Physical Layer) of the OSI model?

A. Hub
B. Switch
C. Router
D. Firewall

45 Which command is commonly used to test the reachability of a host on an IP network?

A. ipconfig
B. ping
C. netstat
D. nslookup

46 What is the macOS operating system derived from?

A. MS-DOS
B. Unix (BSD)
C. Linux
D. Solaris

47 Which of the following describes 'Salting' in cryptography?

A. Adding random data to a password before hashing it
B. Encrypting the data twice
C. Using a longer key
D. Changing the algorithm frequently

48 What is the main security risk of using WEP (Wired Equivalent Privacy) for WiFi?

A. It is too slow.
B. It uses a static key that is easily cracked.
C. It is not compatible with modern phones.
D. It requires a wired connection.

49 In the context of firewalls, what does 'Ingress Filtering' refer to?

A. Filtering traffic leaving the network
B. Filtering traffic entering the network
C. Filtering internal traffic
D. Filtering based on time of day

50 What is the standard port for HTTPS traffic?

A. 80
B. 8080
C. 443
D. 21