Welcome to your Ethical Hacking Fundamentals Quiz.

You have 10 minutes to complete this quiz of 20 questions.
After successful submission, you will receive the results at your registered email address below. For further queries, you can contact us through our Contact Us Page.

Thank you.

Name
Email
Contact Number
Qualification
1. 
[Ethical Hacking]
Which Malware apears to perform user required functions, but internally performs undisclosed attack such as unauthorized access to the attacker’s pc?
2. 
[Ethical Hacking]
Which port number is used by telnet?
3. 
[Ethical Hacking]
Banner grabbing is an example of what?
4. 
[Ethical Hacking]
What is the main function of SPYWARE?
5. 
[Ethical Hacking]
What does the TCP RST command do?
6. 
[Ethical Hacking]
What has now evolved to be one of the most popular automated tools for unethical hacking.
7. 
[Ethical Hacking]
____ is the art of exploiting the human elements to gain access to unauthorized resources.
8. 
[Ethical Hacking]
What is the port number for HTTP Protocol?
9. 
[Ethical Hacking]
What is the first phase of hacking?
10. 
[Ethical Hacking]
How many bits are used by IPv6?
11. 
[Ethical Hacking]
___________ is the process of discovering a route from source to destination.
12. 
[Ethical Hacking]
Which are the four regional Internet registries?
13. 
[Ethical Hacking]
SHA-512 encryption uses ____ bit words.
14. 
[Ethical Hacking]
Hacking for a cause is called
15. 
[Ethical Hacking]
What is the attack called "Evil Twin"?
16. 
[Ethical Hacking]
A packet with all flags set is which type of scan?
17. 
[Ethical Hacking]
When a hacker attempts to attack a host via the internet it is known as what type of attack?
18. 
[Ethical Hacking]
What are the forms of password cracking techniques?
19. 
[Ethical Hacking]
What is the primary goal of an Ethical Hacker?
20. 
[Ethical Hacking]
What is the main characteristic of POLYMORPHIC virus?