1What is the primary difference between a 'Black Hat' hacker and a 'White Hat' hacker?
A.Technical skill level
B.Authorization and intent
C.The operating system used
D.The age of the hacker
Correct Answer: Authorization and intent
Explanation:White Hat hackers hack with permission to improve security (defensive), while Black Hat hackers hack without permission for malicious intent (offensive).
Incorrect! Try again.
2Which term refers to the pre-computer era practice of manipulating telephone networks?
A.Phishing
B.Phreaking
C.Spoofing
D.Sniffing
Correct Answer: Phreaking
Explanation:Phreaking is the action of manipulating the telephone system, which was a precursor to modern computer hacking.
Incorrect! Try again.
3Which phase of the ethical hacking methodology involves gathering information about a target without directly interacting with it?
A.Active Scanning
B.Passive Reconnaissance
C.Gaining Access
D.Enumeration
Correct Answer: Passive Reconnaissance
Explanation:Passive reconnaissance involves collecting data from public sources (like social media or WHOIS) without engaging the target system directly.
Incorrect! Try again.
4In the context of hacking methodologies, what is the primary goal of 'Clearing Tracks'?
A.To install a backdoor
B.To steal data
C.To avoid detection and maintain access
D.To crash the system
Correct Answer: To avoid detection and maintain access
Explanation:Clearing tracks involves deleting logs and removing evidence of the intrusion to prevent security administrators from realizing a breach occurred.
Incorrect! Try again.
5Which type of penetration testing is performed with no prior knowledge of the target system?
A.White Box
B.Black Box
C.Gray Box
D.Crystal Box
Correct Answer: Black Box
Explanation:Black Box testing simulates an external attack where the tester has no prior knowledge of the internal network or systems.
Incorrect! Try again.
6What is the specific legal requirement that distinguishes an ethical hacker from a malicious hacker?
A.A Certified Ethical Hacker (CEH) certification
B.Written permission from the owner
C.Using Linux exclusively
D.Only hacking during business hours
Correct Answer: Written permission from the owner
Explanation:The defining legal characteristic of ethical hacking is having explicit, written authorization from the system owner to test the security.
Incorrect! Try again.
7Which OSI model layer is primarily responsible for logical addressing and routing?
A.Layer 2 (Data Link)
B.Layer 3 (Network)
C.Layer 4 (Transport)
D.Layer 7 (Application)
Correct Answer: Layer 3 (Network)
Explanation:The Network layer (Layer 3) handles logical addressing (IP addresses) and routing packets across different networks.
Incorrect! Try again.
8Which protocol is connection-oriented and ensures reliable data delivery?
A.UDP
B.IP
C.TCP
D.ICMP
Correct Answer: TCP
Explanation:TCP (Transmission Control Protocol) establishes a connection via a handshake and guarantees the delivery and order of data packets.
Incorrect! Try again.
9Which TCP/IP port is the default for unencrypted web traffic (HTTP)?
A.Port 21
B.Port 22
C.Port 80
D.Port 443
Correct Answer: Port 80
Explanation:Port 80 is the standard port assigned to HTTP (Hypertext Transfer Protocol) for unencrypted web pages.
Incorrect! Try again.
10Which port would an administrator typically use for secure remote command-line access to a Linux server?
A.Port 23 (Telnet)
B.Port 22 (SSH)
C.Port 25 (SMTP)
D.Port 110 (POP3)
Correct Answer: Port 22 (SSH)
Explanation:SSH (Secure Shell) uses Port 22 and provides an encrypted channel for remote administration, unlike the insecure Telnet.
Incorrect! Try again.
11What is the primary function of the Domain Name System (DNS) running on Port 53?
A.Assigning IP addresses to devices
B.Resolving domain names to IP addresses
C.Transferring files
D.Sending emails
Correct Answer: Resolving domain names to IP addresses
Explanation:DNS translates human-readable domain names (like www.google.com) into machine-readable IP addresses.
Incorrect! Try again.
12How does a network switch differ from a network hub?
A.A switch broadcasts data to all ports.
B.A switch sends data only to the specific recipient MAC address.
C.A switch cannot connect multiple devices.
D.A switch operates at Layer 3.
Correct Answer: A switch sends data only to the specific recipient MAC address.
Explanation:Unlike a hub, which broadcasts traffic to all ports, a switch uses MAC addresses to forward data only to the intended destination device.
Incorrect! Try again.
13What is a 'broadcast domain'?
A.A group of devices that receive broadcast frames originating from any device in the group
B.A domain used for TV broadcasting
C.A specific IP address range for servers
D.The range of a WiFi signal
Correct Answer: A group of devices that receive broadcast frames originating from any device in the group
Explanation:A broadcast domain is a logical division of a computer network wherein all nodes can reach each other by broadcast at the data link layer.
Incorrect! Try again.
14What is the primary role of a Proxy Server?
A.To route packets between different networks
B.To act as an intermediary between a client and a server
C.To physically connect cables
D.To generate encryption keys
Correct Answer: To act as an intermediary between a client and a server
Explanation:A proxy server sits between a client and the internet, forwarding requests and responses, often for anonymity, caching, or filtering.
Incorrect! Try again.
15Which type of firewall filters traffic based on source, destination, port, and protocol without tracking the state of connections?
A.Stateful Inspection Firewall
B.Packet Filtering Firewall
C.Application Gateway
D.Next-Generation Firewall
Correct Answer: Packet Filtering Firewall
Explanation:Packet filtering firewalls are stateless; they inspect headers of individual packets against a rule set without tracking the context of the connection.
Incorrect! Try again.
16What is a DMZ (Demilitarized Zone) in network security?
A.A network segment with no security
B.A sub-network that exposes external-facing services to an untrusted network
C.A zone where military software is tested
D.An encrypted tunnel
Correct Answer: A sub-network that exposes external-facing services to an untrusted network
Explanation:A DMZ acts as a buffer zone between the internal secure network and the internet, hosting public services like web servers.
Incorrect! Try again.
17Which file system is native to the Windows Operating System?
A.EXT4
B.NTFS
C.HFS+
D.APFS
Correct Answer: NTFS
Explanation:NTFS (New Technology File System) is the proprietary file system developed by Microsoft for Windows.
Incorrect! Try again.
18The Android operating system is based on which kernel?
A.Windows NT
B.Linux Kernel
C.Darwin
D.Hybrid Kernel
Correct Answer: Linux Kernel
Explanation:Android is built on top of a modified version of the Linux kernel.
Incorrect! Try again.
19In Linux, which user account has unrestricted access to all commands and files?
A.Admin
B.SuperUser
C.Root
D.System
Correct Answer: Root
Explanation:The 'root' user in Linux is the superuser account that has full administrative privileges over the entire system.
Incorrect! Try again.
20Which component in Windows stores low-level settings for the OS and installed applications?
A.System32
B.The Registry
C.Kernel
D.Active Directory
Correct Answer: The Registry
Explanation:The Windows Registry is a hierarchical database that stores configuration settings and options for the operating system and low-level system components.
Incorrect! Try again.
21The Caesar Cipher is an example of which type of cryptography?
A.Asymmetric Encryption
B.Substitution Cipher
C.Transposition Cipher
D.Hashing
Correct Answer: Substitution Cipher
Explanation:The Caesar Cipher shifts letters by a fixed number of positions, substituting one character for another.
Incorrect! Try again.
22Which machine was used by the Germans in WWII for encryption and famously broken by Alan Turing?
A.The Colossus
B.The Enigma
C.The Lorenz
D.The Sigaba
Correct Answer: The Enigma
Explanation:The Enigma machine was an electro-mechanical rotor cipher machine used by Nazi Germany for encrypting secret messages.
Incorrect! Try again.
23In Symmetric Cryptography, how many keys are used for the encryption and decryption process?
A.One
B.Two
C.Three
D.Four
Correct Answer: One
Explanation:Symmetric cryptography uses a single shared key for both encrypting the plaintext and decrypting the ciphertext.
Incorrect! Try again.
24Which of the following is a symmetric encryption algorithm?
A.RSA
B.AES
C.ECC
D.Diffie-Hellman
Correct Answer: AES
Explanation:AES (Advanced Encryption Standard) is a symmetric block cipher. RSA, ECC, and Diffie-Hellman are asymmetric.
Incorrect! Try again.
25What is a major disadvantage of Symmetric Cryptography?
A.It is slower than asymmetric cryptography.
B.It increases file size.
C.Key distribution and sharing is difficult.
D.It cannot be implemented on mobile devices.
Correct Answer: Key distribution and sharing is difficult.
Explanation:Since the same key is used for encryption and decryption, securely sharing that key with the recipient without it being intercepted is a major challenge.
Incorrect! Try again.
26Asymmetric Cryptography is also known as:
A.Secret-key cryptography
B.Public-key cryptography
C.One-way cryptography
D.Block cipher
Correct Answer: Public-key cryptography
Explanation:Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption.
Incorrect! Try again.
27In an asymmetric encryption scenario, if Alice wants to send a confidential message to Bob, which key does she use to encrypt the message?
A.Alice's Private Key
B.Alice's Public Key
C.Bob's Public Key
D.Bob's Private Key
Correct Answer: Bob's Public Key
Explanation:To ensure only Bob can read the message, Alice encrypts it with Bob's Public Key. Only Bob's Private Key can decrypt it.
Incorrect! Try again.
28Which algorithm is a widely used Asymmetric cryptosystem?
A.DES
B.AES
C.RSA
D.3DES
Correct Answer: RSA
Explanation:RSA (Rivest–Shamir–Adleman) is a standard asymmetric algorithm used for secure data transmission.
Incorrect! Try again.
29What is the primary purpose of a Hashing algorithm?
A.To encrypt data for confidentiality
B.To compress data
C.To verify data integrity
D.To create a communication tunnel
Correct Answer: To verify data integrity
Explanation:Hashing creates a unique fixed-length string (digest) from data. If the data changes, the hash changes, allowing verification of integrity.
Incorrect! Try again.
30Which of the following is a characteristic of a secure hash function?
A.It is reversible (two-way).
B.It uses two keys.
C.It is a one-way function.
D.It produces variable length output.
Correct Answer: It is a one-way function.
Explanation:Hash functions are designed to be one-way; it should be computationally impossible to recreate the original data from the hash value.
Incorrect! Try again.
31What is a 'Collision' in the context of hashing?
A.When two different inputs produce the same hash output
B.When a hash function crashes
C.When encryption and decryption happen simultaneously
D.When data is lost during hashing
Correct Answer: When two different inputs produce the same hash output
Explanation:A collision occurs when two distinct pieces of data generate the exact same hash digest, which is a security vulnerability.
Incorrect! Try again.
32Which hashing algorithm is considered insecure today due to collision vulnerabilities?
A.SHA-256
B.SHA-3
C.MD5
D.Whirlpool
Correct Answer: MD5
Explanation:MD5 is now considered cryptographically broken because collisions can be generated easily on modern hardware.
Incorrect! Try again.
33What is the 'Man-in-the-Middle' (MITM) attack in the context of cryptography?
A.An attacker guessing the password
B.An attacker physically stealing the server
C.An attacker intercepting and possibly altering communications between two parties
D.An attacker deleting the database
Correct Answer: An attacker intercepting and possibly altering communications between two parties
Explanation:In MITM, the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Incorrect! Try again.
34IPsec is primarily used to secure which type of connection?
A.Email transmission
B.File storage
C.Virtual Private Networks (VPNs)
D.Web browsing (HTTPS)
Correct Answer: Virtual Private Networks (VPNs)
Explanation:IPsec (Internet Protocol Security) is a suite of protocols used to secure internet protocol communications, commonly used to create VPNs.
Incorrect! Try again.
35What are the two main modes of operation for IPsec?
A.Open and Closed
B.Tunnel and Transport
C.Public and Private
D.Block and Stream
Correct Answer: Tunnel and Transport
Explanation:Transport mode encrypts only the payload, while Tunnel mode encrypts the entire IP packet (header and payload).
Incorrect! Try again.
36What is PGP (Pretty Good Privacy) primarily used for?
A.Securing hard drives
B.Securing email communications
C.Securing WiFi passwords
D.Securing routing tables
Correct Answer: Securing email communications
Explanation:PGP is a data encryption and decryption program that provides cryptographic privacy and authentication, widely used for signing and encrypting emails.
Incorrect! Try again.
37Which protocol succeeded SSL (Secure Sockets Layer) to provide secure web browsing?
A.TLS (Transport Layer Security)
B.SSH
C.IPsec
D.HTTP
Correct Answer: TLS (Transport Layer Security)
Explanation:TLS is the successor to SSL. While we still often say 'SSL certificates', modern secure web traffic actually uses TLS.
Incorrect! Try again.
38What is the purpose of a Digital Signature?
A.To encrypt the message
B.To hide the message
C.To verify authenticity and non-repudiation
D.To compress the message
Correct Answer: To verify authenticity and non-repudiation
Explanation:A digital signature ensures the message came from the claimed sender (authenticity) and that the sender cannot deny sending it (non-repudiation).
Incorrect! Try again.
39In the context of SSL/TLS, what role does a Certificate Authority (CA) play?
A.It encrypts the traffic.
B.It acts as a trusted third party that issues digital certificates.
C.It hosts the website.
D.It creates the HTML content.
Correct Answer: It acts as a trusted third party that issues digital certificates.
Explanation:A CA verifies the identity of the entity requesting a certificate and issues it, allowing browsers to trust the secure connection.
Incorrect! Try again.
40Which cryptographic concept refers to hiding a secret message within an ordinary file, like an image?
A.Cryptography
B.Steganography
C.Hashing
D.Obfuscation
Correct Answer: Steganography
Explanation:Steganography involves hiding the existence of the data itself (e.g., hiding text inside the bits of an image file), distinct from encryption which hides the meaning.
Incorrect! Try again.
41Which phase of hacking involves scanning the network for specific IP addresses and open ports?
A.Reconnaissance
B.Scanning
C.Gaining Access
D.Maintaining Access
Correct Answer: Scanning
Explanation:Scanning involves taking the information found during reconnaissance and using it to examine the network actively for live hosts, open ports, and services.
Incorrect! Try again.
42What is a 'Gray Hat' hacker?
A.Someone who hacks for government agencies
B.Someone who hacks without permission but often without malicious intent, and may disclose vulnerabilities to the owner
C.A hacker who is retired
D.A hacker who only uses old hardware
Correct Answer: Someone who hacks without permission but often without malicious intent, and may disclose vulnerabilities to the owner
Explanation:Gray Hats sit between White and Black Hats. They may violate laws/standards (no permission) but usually don't hack for personal gain or malice.
Incorrect! Try again.
43In a TCP header, which flag is used to initiate a connection?
A.FIN
B.ACK
C.SYN
D.RST
Correct Answer: SYN
Explanation:The SYN (Synchronize) flag is used as the first step in the three-way handshake to initiate a TCP connection.
Incorrect! Try again.
44Which network device operates at Layer 1 (Physical Layer) of the OSI model?
A.Hub
B.Switch
C.Router
D.Firewall
Correct Answer: Hub
Explanation:A hub is a basic networking device that connects multiple computers but operates purely physically, broadcasting signals to all ports without logic.
Incorrect! Try again.
45Which command is commonly used to test the reachability of a host on an IP network?
A.ipconfig
B.ping
C.netstat
D.nslookup
Correct Answer: ping
Explanation:Ping uses ICMP echo requests to test connectivity between the source and a destination IP.
Incorrect! Try again.
46What is the macOS operating system derived from?
A.MS-DOS
B.Unix (BSD)
C.Linux
D.Solaris
Correct Answer: Unix (BSD)
Explanation:macOS is built on top of Darwin, which is a Unix-like operating system based on BSD (Berkeley Software Distribution).
Incorrect! Try again.
47Which of the following describes 'Salting' in cryptography?
A.Adding random data to a password before hashing it
B.Encrypting the data twice
C.Using a longer key
D.Changing the algorithm frequently
Correct Answer: Adding random data to a password before hashing it
Explanation:Salting involves adding unique random data to inputs before hashing to defend against rainbow table attacks and ensure identical passwords have different hashes.
Incorrect! Try again.
48What is the main security risk of using WEP (Wired Equivalent Privacy) for WiFi?
A.It is too slow.
B.It uses a static key that is easily cracked.
C.It is not compatible with modern phones.
D.It requires a wired connection.
Correct Answer: It uses a static key that is easily cracked.
Explanation:WEP has significant cryptographic vulnerabilities involving its initialization vectors, allowing attackers to crack the key in minutes.
Incorrect! Try again.
49In the context of firewalls, what does 'Ingress Filtering' refer to?
A.Filtering traffic leaving the network
B.Filtering traffic entering the network
C.Filtering internal traffic
D.Filtering based on time of day
Correct Answer: Filtering traffic entering the network
Explanation:Ingress filtering monitors and filters incoming packets to restrict forbidden traffic or spoofed IP addresses from entering the network.
Incorrect! Try again.
50What is the standard port for HTTPS traffic?
A.80
B.8080
C.443
D.21
Correct Answer: 443
Explanation:Port 443 is the standard port reserved for secure web traffic using SSL/TLS (HTTPS).
Incorrect! Try again.
Give Feedback
Help us improve by sharing your thoughts or reporting issues.