Question : 1 What is the primary goal of ethical hacking?
To exploit vulnerabilities for personal gain
To penetrate networks without permission
To identify and fix security vulnerabilities
To cause harm to computer systems
Question : 2 Which term refers to a program or script that automates the process of finding security vulnerabilities?
Malware
Virus
Exploit
Security Scanner
Question : 3 What is the practice of gathering information about a target system without directly interacting with it?
Hacking
Footprinting
Phishing
Spoofing
Question : 4 Which type of attack involves flooding a network or system with excessive traffic to make it unavailable to users?
Phishing
Denial of Service (DoS)
Spoofing
Man-in-the-Middle (MitM)
Question : 5 What is the term for an attack that involves intercepting and altering communication between two parties without their knowledge?
Phishing
Spoofing
Man-in-the-Middle (MitM)
Denial of Service (DoS)
Question : 6 Which of the following is NOT a phase of ethical hacking?
Reconnaissance
Exploitation
Post-Attack
Attack
Question : 7 What is the process of tricking individuals into divulging sensitive information by pretending to be a legitimate entity?
Hacking
Spoofing
Phishing
Denial of Service (DoS)
Question : 8 What is the term for the practice of redirecting users from legitimate websites to fraudulent ones to steal their credentials?
Pharming
Spoofing
Phishing
Denial of Service (DoS)
Question : 9 Which type of attack involves modifying DNS records to redirect users to fake websites?
Pharming
Phishing
Spoofing
Man-in-the-Middle (MitM)
Question : 10 What is the term for an attack that involves exploiting vulnerabilities in software to gain unauthorized access?
Phishing
Exploit
Spoofing
Denial of Service (DoS)
Question : 11 Which term refers to an attack that involves using one compromised system to attack other systems within the same network?
Phishing
Spoofing
Pivoting
Denial of Service (DoS)
Question : 12 Which of the following is NOT considered a social engineering technique?
Phishing
Shoulder Surfing
SQL Injection
Tailgating
Question : 13 What is the term for an attack that involves capturing and analyzing network traffic to gather sensitive information?
Phishing
Spoofing
Sniffing
Denial of Service (DoS)
Question : 14 Which of the following is NOT a common cryptography attack?
Brute Force
Social Engineering
Man-in-the-Middle (MitM)
Cryptanalysis
Question : 15 Which term refers to an attack that involves overwhelming a system by sending more data than it can handle?
Phishing
Spoofing
Buffer Overflow
Denial of Service (DoS)