
Cybersecurity & Ethical Hacking Quiz
Authored by Gamkers Official
Computers
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the primary objective of ethical hacking?
To exploit vulnerabilities for financial gain
To prevent and protect systems from being hacked
To steal confidential information
To deface websites
Answer explanation
The primary objective of ethical hacking is to prevent and protect systems from being hacked. Ethical hackers identify vulnerabilities to strengthen security, unlike malicious hackers who exploit them for personal gain.
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is NOT a type of malware?
Virus
Worm
Keylogger
Firewall
Answer explanation
A firewall is not a type of malware; it is a security system that monitors and controls incoming and outgoing network traffic. In contrast, a virus, worm, and keylogger are all types of malware designed to harm or exploit systems.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a DDoS attack?
Distributed Denial of Service
Data Disruption Over System
Data Duplication and System Overload
Data Destruction on Open Servers
Answer explanation
A DDoS attack stands for Distributed Denial of Service. It involves multiple systems overwhelming a target server, making it unavailable to users. The other options do not accurately describe this type of cyber attack.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a common tool used for network sniffing?
Metasploit
Wireshark
Nmap
John the Ripper
Answer explanation
Wireshark is a widely used network protocol analyzer that captures and displays data packets in real-time, making it a common tool for network sniffing. The other options serve different purposes.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is "social engineering" in the context of hacking?
A technique used to exploit software vulnerabilities
Manipulating people into providing sensitive information
Bypassing firewalls and antivirus software
A type of malware that targets social media platforms
Answer explanation
Social engineering involves manipulating individuals to divulge confidential information, making 'Manipulating people into providing sensitive information' the correct choice. It focuses on human interaction rather than technical exploits.
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does the tool Nmap primarily do?
Network scanning
Password cracking
File encryption
Malware analysis
Answer explanation
Nmap is a powerful tool used for network scanning, allowing users to discover hosts and services on a computer network. It does not perform password cracking, file encryption, or malware analysis.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a method of password cracking?
SQL Injection
Brute Force Attack
Cross-Site Scripting (XSS)
DDoS Attack
Answer explanation
A Brute Force Attack is a method of password cracking where an attacker systematically tries all possible combinations of passwords until the correct one is found. The other options are not methods for cracking passwords.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?