Unit 1 - Practice Quiz

INT244 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary difference between a 'Black Hat' hacker and a 'White Hat' hacker?

A. Technical skill level
B. Authorization and intent
C. The operating system used
D. The age of the hacker

2 Which term refers to the pre-computer era practice of manipulating telephone networks?

A. Phreaking
B. Spoofing
C. Sniffing
D. Phishing

3 Which phase of the ethical hacking methodology involves gathering information about a target without directly interacting with it?

A. Active Scanning
B. Passive Reconnaissance
C. Enumeration
D. Gaining Access

4 In the context of hacking methodologies, what is the primary goal of 'Clearing Tracks'?

A. To steal data
B. To install a backdoor
C. To avoid detection and maintain access
D. To crash the system

5 Which type of penetration testing is performed with no prior knowledge of the target system?

A. Gray Box
B. Crystal Box
C. White Box
D. Black Box

6 What is the specific legal requirement that distinguishes an ethical hacker from a malicious hacker?

A. Using Linux exclusively
B. A Certified Ethical Hacker (CEH) certification
C. Only hacking during business hours
D. Written permission from the owner

7 Which OSI model layer is primarily responsible for logical addressing and routing?

A. Layer 2 (Data Link)
B. Layer 3 (Network)
C. Layer 4 (Transport)
D. Layer 7 (Application)

8 Which protocol is connection-oriented and ensures reliable data delivery?

A. ICMP
B. UDP
C. IP
D. TCP

9 Which TCP/IP port is the default for unencrypted web traffic (HTTP)?

A. Port 21
B. Port 80
C. Port 22
D. Port 443

10 Which port would an administrator typically use for secure remote command-line access to a Linux server?

A. Port 25 (SMTP)
B. Port 22 (SSH)
C. Port 110 (POP3)
D. Port 23 (Telnet)

11 What is the primary function of the Domain Name System (DNS) running on Port 53?

A. Assigning IP addresses to devices
B. Transferring files
C. Resolving domain names to IP addresses
D. Sending emails

12 How does a network switch differ from a network hub?

A. A switch broadcasts data to all ports.
B. A switch operates at Layer 3.
C. A switch sends data only to the specific recipient MAC address.
D. A switch cannot connect multiple devices.

13 What is a 'broadcast domain'?

A. A specific IP address range for servers
B. The range of a WiFi signal
C. A domain used for TV broadcasting
D. A group of devices that receive broadcast frames originating from any device in the group

14 What is the primary role of a Proxy Server?

A. To generate encryption keys
B. To physically connect cables
C. To act as an intermediary between a client and a server
D. To route packets between different networks

15 Which type of firewall filters traffic based on source, destination, port, and protocol without tracking the state of connections?

A. Next-Generation Firewall
B. Packet Filtering Firewall
C. Application Gateway
D. Stateful Inspection Firewall

16 What is a DMZ (Demilitarized Zone) in network security?

A. A network segment with no security
B. An encrypted tunnel
C. A sub-network that exposes external-facing services to an untrusted network
D. A zone where military software is tested

17 Which file system is native to the Windows Operating System?

A. HFS+
B. NTFS
C. EXT4
D. APFS

18 The Android operating system is based on which kernel?

A. Hybrid Kernel
B. Darwin
C. Linux Kernel
D. Windows NT

19 In Linux, which user account has unrestricted access to all commands and files?

A. Root
B. System
C. Admin
D. SuperUser

20 Which component in Windows stores low-level settings for the OS and installed applications?

A. System32
B. Active Directory
C. The Registry
D. Kernel

21 The Caesar Cipher is an example of which type of cryptography?

A. Substitution Cipher
B. Hashing
C. Transposition Cipher
D. Asymmetric Encryption

22 Which machine was used by the Germans in WWII for encryption and famously broken by Alan Turing?

A. The Lorenz
B. The Enigma
C. The Colossus
D. The Sigaba

23 In Symmetric Cryptography, how many keys are used for the encryption and decryption process?

A. Four
B. Three
C. One
D. Two

24 Which of the following is a symmetric encryption algorithm?

A. RSA
B. AES
C. Diffie-Hellman
D. ECC

25 What is a major disadvantage of Symmetric Cryptography?

A. It is slower than asymmetric cryptography.
B. It cannot be implemented on mobile devices.
C. Key distribution and sharing is difficult.
D. It increases file size.

26 Asymmetric Cryptography is also known as:

A. Secret-key cryptography
B. Public-key cryptography
C. Block cipher
D. One-way cryptography

27 In an asymmetric encryption scenario, if Alice wants to send a confidential message to Bob, which key does she use to encrypt the message?

A. Bob's Private Key
B. Alice's Public Key
C. Alice's Private Key
D. Bob's Public Key

28 Which algorithm is a widely used Asymmetric cryptosystem?

A. DES
B. RSA
C. AES
D. 3DES

29 What is the primary purpose of a Hashing algorithm?

A. To compress data
B. To encrypt data for confidentiality
C. To create a communication tunnel
D. To verify data integrity

30 Which of the following is a characteristic of a secure hash function?

A. It is a one-way function.
B. It is reversible (two-way).
C. It produces variable length output.
D. It uses two keys.

31 What is a 'Collision' in the context of hashing?

A. When two different inputs produce the same hash output
B. When data is lost during hashing
C. When a hash function crashes
D. When encryption and decryption happen simultaneously

32 Which hashing algorithm is considered insecure today due to collision vulnerabilities?

A. SHA-3
B. Whirlpool
C. MD5
D. SHA-256

33 What is the 'Man-in-the-Middle' (MITM) attack in the context of cryptography?

A. An attacker guessing the password
B. An attacker deleting the database
C. An attacker intercepting and possibly altering communications between two parties
D. An attacker physically stealing the server

34 IPsec is primarily used to secure which type of connection?

A. File storage
B. Virtual Private Networks (VPNs)
C. Web browsing (HTTPS)
D. Email transmission

35 What are the two main modes of operation for IPsec?

A. Public and Private
B. Open and Closed
C. Block and Stream
D. Tunnel and Transport

36 What is PGP (Pretty Good Privacy) primarily used for?

A. Securing hard drives
B. Securing routing tables
C. Securing email communications
D. Securing WiFi passwords

37 Which protocol succeeded SSL (Secure Sockets Layer) to provide secure web browsing?

A. SSH
B. IPsec
C. TLS (Transport Layer Security)
D. HTTP

38 What is the purpose of a Digital Signature?

A. To verify authenticity and non-repudiation
B. To compress the message
C. To encrypt the message
D. To hide the message

39 In the context of SSL/TLS, what role does a Certificate Authority (CA) play?

A. It acts as a trusted third party that issues digital certificates.
B. It creates the HTML content.
C. It encrypts the traffic.
D. It hosts the website.

40 Which cryptographic concept refers to hiding a secret message within an ordinary file, like an image?

A. Cryptography
B. Obfuscation
C. Steganography
D. Hashing

41 Which phase of hacking involves scanning the network for specific IP addresses and open ports?

A. Maintaining Access
B. Gaining Access
C. Scanning
D. Reconnaissance

42 What is a 'Gray Hat' hacker?

A. A hacker who is retired
B. A hacker who only uses old hardware
C. Someone who hacks without permission but often without malicious intent, and may disclose vulnerabilities to the owner
D. Someone who hacks for government agencies

43 In a TCP header, which flag is used to initiate a connection?

A. FIN
B. ACK
C. RST
D. SYN

44 Which network device operates at Layer 1 (Physical Layer) of the OSI model?

A. Router
B. Firewall
C. Hub
D. Switch

45 Which command is commonly used to test the reachability of a host on an IP network?

A. ipconfig
B. netstat
C. ping
D. nslookup

46 What is the macOS operating system derived from?

A. Unix (BSD)
B. MS-DOS
C. Linux
D. Solaris

47 Which of the following describes 'Salting' in cryptography?

A. Adding random data to a password before hashing it
B. Encrypting the data twice
C. Using a longer key
D. Changing the algorithm frequently

48 What is the main security risk of using WEP (Wired Equivalent Privacy) for WiFi?

A. It requires a wired connection.
B. It uses a static key that is easily cracked.
C. It is too slow.
D. It is not compatible with modern phones.

49 In the context of firewalls, what does 'Ingress Filtering' refer to?

A. Filtering traffic entering the network
B. Filtering based on time of day
C. Filtering traffic leaving the network
D. Filtering internal traffic

50 What is the standard port for HTTPS traffic?

A. 8080
B. 21
C. 80
D. 443