Welcome to your Ethical Hacking Fundamentals Quiz. You have 10 minutes to complete this quiz of 20 questions. After successful submission, you will receive the results at your registered email address below. For further queries, you can contact us through our Contact Us Page. Thank you. Name Email Contact Number Qualification 1. [Ethical Hacking] What has now evolved to be one of the most popular automated tools for unethical hacking. Deselect Answer Database software Automated apps Worms Malware 2. [Ethical Hacking] How many bits are used by IPv6? Deselect Answer 128 64 32 24 3. [Ethical Hacking] What is the port number for HTTP Protocol? Deselect Answer 90 100 80 110 4. [Ethical Hacking] SHA-512 encryption uses ____ bit words. Deselect Answer 256 64 512 32 5. [Ethical Hacking] ____ is the art of exploiting the human elements to gain access to unauthorized resources. Deselect Answer Reverse Engineering Hacking Organization Social Engineering 6. [Ethical Hacking] ___________ is the process of discovering a route from source to destination. Deselect Answer Superiornetting Routing Subnetting Supernetting 7. [Ethical Hacking] Banner grabbing is an example of what? Deselect Answer Passive OS fingerprinting Application Analysis Footprinting Active OS fingerprinting 8. [Ethical Hacking] What is the main function of SPYWARE? Deselect Answer To send your personal information to some other computer through internet. To delete files. To create DoS attack. To damage our resources. 9. [Ethical Hacking] What is the primary goal of an Ethical Hacker? Deselect Answer Resolving security vulnerabilities Determining return on investment for security measures Testing security controls Avoiding detection 10. [Ethical Hacking] What is the first phase of hacking? Deselect Answer Maintaining access Scanning Reconnaissance Gaining access 11. [Ethical Hacking] Which Malware apears to perform user required functions, but internally performs undisclosed attack such as unauthorized access to the attacker’s pc? Deselect Answer Spyware Trojans Virus Worms 12. [Ethical Hacking] A packet with all flags set is which type of scan? Deselect Answer XMAS Syn scan TCP connect Full Open 13. [Ethical Hacking] What is the attack called "Evil Twin"? Deselect Answer Rogue Access Point MAC Spoofing Session Hijacking ARP Poisoning 14. [Ethical Hacking] When a hacker attempts to attack a host via the internet it is known as what type of attack? Deselect Answer Internal Attack Local Access Attack Remote Attack Physical Access Attack 15. [Ethical Hacking] Which port number is used by telnet? Deselect Answer 50 30 90 23 16. [Ethical Hacking] What is the main characteristic of POLYMORPHIC virus? It does not change its program codes. After-Effect pattern remains same in each infection. After-Effect pattern changes in each infection. It changes its program codes after each infection. 17. [Ethical Hacking] Which are the four regional Internet registries? Deselect Answer APNIC, PICNIC, NANIC, ARIN APNIC, LACNIC, ARIN, RIPE NCC APNIC, PICNIC, NANIC, RIPE NCC APNIC, MOSTNIC, ARIN, RIPE NCC 18. [Ethical Hacking] What are the forms of password cracking techniques? Deselect Answer Brute Force Attack All of the above Hybrid Attack Syllable Attack 19. [Ethical Hacking] What does the TCP RST command do? Deselect Answer Finishes a TCP connection Restores the connection to a previous state Starts a TCP connection Resets the TCP connection 20. [Ethical Hacking] Hacking for a cause is called Deselect Answer Active Hacking Hacktivism Black Hat Hacking Activism