Unit 3 - Practice Quiz

INT244

1 What is the primary goal of Enumeration in the ethical hacking process?

A. To crash the target system
B. To gather specific information like user names, shares, and services from a system
C. To physically access the server room
D. To encrypt the target's data

2 Which phase of hacking immediately precedes Enumeration?

A. System Hacking
B. Scanning
C. Maintaining Access
D. Clearing Tracks

3 In Windows Enumeration, what is a 'Null Session'?

A. A session with administrator privileges
B. An unauthenticated connection to the IPC$ share
C. A session that has been timed out
D. A connection using an encrypted VPN

4 Which port is primarily associated with NetBIOS Name Service?

A. Port 137
B. Port 80
C. Port 443
D. Port 21

5 What command-line tool is used to display NetBIOS over TCP/IP statistics and current connections?

A. ping
B. ipconfig
C. nbtstat
D. tracert

6 What does SNMP stand for?

A. Simple Network Management Protocol
B. Secure Network Monitoring Protocol
C. Standard Network Mapping Procedure
D. System Node Maintenance Protocol

7 In SNMP, what is the 'MIB'?

A. Management Information Base
B. Master IP Block
C. Main Interface Bridge
D. Malware Infection Block

8 What are the two default community strings often used in SNMP?

A. admin and user
B. root and guest
C. public and private
D. default and secure

9 Which protocol is targeted during Directory Service Enumeration to query Active Directory?

A. HTTP
B. FTP
C. LDAP
D. SSH

10 What is the default TCP port for LDAP?

A. 25
B. 53
C. 389
D. 3389

11 Which SMTP command is used to verify if a user exists on the mail server?

A. HELO
B. VRFY
C. DATA
D. QUIT

12 Which SMTP command expands a mailing list to show its members?

A. EXPN
B. RCPT
C. MAIL
D. RSET

13 What is the definition of System Hacking?

A. Scanning a network for live hosts
B. The process of gaining access, escalating privileges, and hiding files
C. Monitoring network traffic for anomalies
D. Developing security policies

14 Which password attack involves trying every possible combination of characters?

A. Dictionary Attack
B. Brute Force Attack
C. Social Engineering
D. Shoulder Surfing

15 What is a 'Rainbow Table' used for?

A. Visualizing network traffic
B. Looking up pre-computed password hashes
C. Encrypting email communications
D. Storing firewall rules

16 Adding random bits of data to a password before hashing it to defeat Rainbow Tables is called:

A. Salting
B. Peppering
C. Spiceing
D. Masking

17 In Microsoft Windows, where are local user account passwords stored (in hashed form)?

A. In the Registry SAM file
B. In the kernel32.dll
C. In the boot.ini file
D. In the My Documents folder

18 What is the legacy authentication protocol used by older Windows systems, known for vulnerabilities?

A. Kerberos
B. NTLM
C. OAUTH
D. RADIUS

19 What is the primary authentication protocol used in Active Directory environments?

A. Kerberos
B. SSL
C. WEP
D. CHAP

20 What entity issues tickets in the Kerberos protocol?

A. The Client
B. The Key Distribution Center (KDC)
C. The File Server
D. The Gateway

21 What is 'Privilege Escalation'?

A. Downgrading user rights to Guest
B. Gaining higher-level access (e.g., Administrator) from a standard user account
C. Moving laterally to another computer with same rights
D. Resetting a password

22 Which tool allows an attacker to execute processes on a remote system, often used in Windows environments?

A. PsExec
B. Notepad
C. Calc
D. Paint

23 Software designed to infiltrate or damage a computer system without the owner's informed consent is collectively known as:

A. Firmware
B. Shareware
C. Malware
D. Freeware

24 What distinguishes a Computer Virus from a Worm?

A. A virus requires a host program to replicate, while a worm is standalone
B. A virus encrypts data, a worm deletes it
C. A virus travels over networks, a worm stays local
D. There is no difference

25 Which type of malware disguises itself as legitimate software to trick the user into installing it?

A. Trojan Horse
B. Worm
C. Virus
D. Logic Bomb

26 What is the primary function of Ransomware?

A. To steal credit card numbers quietly
B. To encrypt user files and demand payment for the decryption key
C. To display advertisements
D. To turn the computer into a bot

27 Software that gathers information about a person or organization without their knowledge is called:

A. Spyware
B. Ransomware
C. Adware
D. Logic Bomb

28 Malware that automatically delivers advertisements is known as:

A. Adware
B. Rootkit
C. Botnet
D. Virus

29 What is 'Scareware'?

A. Software that screams when opened
B. Malware that tricks users into buying unnecessary software by claiming their computer is infected
C. A virus that deletes system 32
D. A worm that spreads via email

30 A type of malicious code that remains dormant until a specific event or date triggers it is called:

A. Logic Bomb
B. Spyware
C. Adware
D. Backdoor

31 What is a 'Rootkit'?

A. A kit for rooting Android phones
B. Software designed to hide the existence of other malware and maintain privileged access
C. A password cracking tool
D. A database scanning tool

32 A 'Polymorphic Virus' is difficult to detect because:

A. It is written in Python
B. It changes its code or signature each time it infects a new file
C. It is invisible to the user
D. It only runs on Linux

33 What is a 'Macro Virus'?

A. A virus that is very large in file size
B. A virus written in the macro language of applications like Microsoft Word or Excel
C. A virus that infects the boot sector
D. A virus that attacks Mac computers

34 A network of compromised computers controlled by an attacker is called a:

A. Botnet
B. Intranet
C. Subnet
D. Darknet

35 What is a 'Wrapper' or 'Binder' in the context of Trojans?

A. A tool used to combine a malicious executable with a legitimate file
B. A type of antivirus
C. A firewall rule
D. A method of encrypting emails

36 Which of the following describes a 'Drive-by Download'?

A. Downloading files to a USB drive
B. Unintended download of malware by visiting a compromised website
C. Downloading drivers for a printer
D. Manually downloading a virus for research

37 Under U.S. law, which act is primarily used to prosecute computer hacking and malware distribution?

A. HIPAA
B. CFAA (Computer Fraud and Abuse Act)
C. SOX
D. GDPR

38 In the context of malware and the law, what does 'Intent' typically determine?

A. The speed of the internet connection
B. The difference between accidental damage and criminal liability
C. The programming language used
D. The cost of the hardware

39 What is an 'Overt Channel'?

A. A hidden communication path
B. A legitimate, authorized communication path for transferring data
C. A channel used only by spies
D. An encrypted VPN

40 What is a 'Covert Channel'?

A. A TV channel for hackers
B. A mechanism used to transfer information in a way that violates the system's security policy
C. A standard FTP connection
D. A public chat room

41 Hiding data within the headers of TCP/IP packets is an example of:

A. Overt Channel
B. Covert Storage Channel
C. Social Engineering
D. Phishing

42 Manipulating system resources to signal information (e.g., CPU usage patterns) is an example of:

A. Covert Timing Channel
B. Covert Storage Channel
C. Overt Channel
D. Multiplexing

43 Steganography is best described as:

A. Scrambling text so it is unreadable
B. Hiding the existence of a message within another medium (like an image)
C. Cracking passwords
D. Scanning ports

44 Which tool is commonly used to extract password hashes from Windows memory (LSASS)?

A. Mimikatz
B. Wireshark
C. Nmap
D. Ping

45 What is a 'Zero-Day' exploit?

A. An exploit that takes zero days to fix
B. An attack that exploits a vulnerability unknown to the software vendor
C. An attack that occurs at midnight
D. A virus that lasts for zero days

46 What is the purpose of a 'Keylogger'?

A. To log into a website
B. To record every keystroke made by a user
C. To lock the keyboard
D. To generate encryption keys

47 Which Windows service is the 'Local Security Authority' responsible for validating users?

A. LSASS.EXE
B. SVCHOST.EXE
C. EXPLORER.EXE
D. WINLOGON.EXE

48 A malware that restricts access to the computer system until a fee is paid is specifically targeting which aspect of the CIA triad?

A. Confidentiality
B. Integrity
C. Availability
D. Non-repudiation

49 In Windows, what does the command net user do?

A. Displays network statistics
B. Adds, removes, or modifies user accounts
C. Connects to a shared folder
D. Starts a service

50 Which of the following is an example of a Multipartite Virus?

A. A virus that attacks both the boot sector and executable files
B. A virus that has multiple parts
C. A virus that attacks multiple people
D. A virus that uses multiple encryption keys