This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
__________ is the last phase of ethical hacking process.(a) Scanning(b) Tracks clearing(c) Reconnaissance(d) ReportingThe question was posed to me during an interview for a job.The doubt is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security |
|
Answer» CORRECT answer is (d) Reporting To explain I WOULD say: In the reporting phase, the penetration TESTER or ethical hacker has to assemble all the flaws along with the tools and PROCESSES used for DETECTING then and report it to the firm or organization. |
|
| 2. |
Which of the following is not a footprint-scanning tool?(a) SuperScan(b) TcpView(c) Maltego(d) OWASP ZedThis question was posed to me during an internship interview.Enquiry is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security |
|
Answer» The correct answer is (C) Maltego |
|
| 3. |
Which of them is not a track clearing technique?(a) Altering log files(b) Tunnelling(c) Port Scanning(d) Footprint removingI had been asked this question during an online exam.My query is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (C) Port Scanning |
|
| 4. |
In _______ phase, the hackers try to hide their footprints.(a) Scanning(b) Tracks clearing(c) Reconnaissance(d) Gaining accessThis question was addressed to me in quiz.My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (B) Tracks clearing |
|
| 5. |
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?(a) Rootkits(b) Backdoors(c) Trojans(d) WiresharkI had been asked this question during an online interview.This intriguing question comes from Generic Steps for Security topic in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) WIRESHARK |
|
| 6. |
_______ is the tool used for this purpose.(a) Powersploit(b) Aircrack – ng(c) Snort(d) NmapThe question was asked by my school principal while I was bunking the class.Asked question is from Generic Steps for Security in section Cyber Security of Cyber Security |
|
Answer» The CORRECT option is (a) Powersploit |
|
| 7. |
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.(a) security officer(b) malicious hacker(c) security auditor(d) network analystThis question was addressed to me by my college director while I was bunking the class.This interesting question is from Generic Steps for Security topic in portion Cyber Security of Cyber Security |
|
Answer» CORRECT ANSWER is (b) MALICIOUS hacker Explanation: Malicious hackers can GAIN illegal access at OS level, APPLICATION level or network level if the penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a system. |
|
| 8. |
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?(a) Scanning(b) Maintaining access(c) Maintaining Access(d) Gaining accessThe question was posed to me in an online quiz.My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security |
|
Answer» Correct choice is (c) Maintaining Access |
|
| 9. |
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?(a) Maltego(b) NMAP(c) Metasploit(d) NessusI had been asked this question by my college director while I was bunking the class.Question is from Generic Steps for Security topic in section Cyber Security of Cyber Security |
|
Answer» RIGHT CHOICE is (c) Metasploit Easy explanation: Metasploit is a framework and the most widely used penetration TESTING TOOL used by ethical HACKERS for testing the vulnerabilities in a system or network. |
|
| 10. |
Which of the following is not done in gaining access phase?(a) Tunnelling(b) Buffer overflow(c) Session hijacking(d) Password crackingI have been asked this question in class test.Question is taken from Generic Steps for Security topic in section Cyber Security of Cyber Security |
|
Answer» The correct option is (a) Tunnelling |
|
| 11. |
In __________ phase the hacker exploits the network or system vulnerabilities.(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThe question was posed to me in examination.I would like to ask this question from Generic Steps for Security topic in section Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (d) Gaining access |
|
| 12. |
Which of the following comes after scanning phase in ethical hacking?(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThis question was posed to me in semester exam.The doubt is from Generic Steps for Security topic in section Cyber Security of Cyber Security |
|
Answer» Right answer is (d) Gaining access |
|
| 13. |
Which of them is not a scanning tool?(a) NMAP(b) Nexpose(c) Maltego(d) NessusI had been asked this question in an interview.Query is from Generic Steps for Security in division Cyber Security of Cyber Security |
|
Answer» The correct option is (C) Maltego |
|
| 14. |
Which of them does not comes under scanning methodologies?(a) Vulnerability scanning(b) Sweeping(c) Port Scanning(d) Google DorksI got this question in quiz.My doubt is from Generic Steps for Security topic in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) Google Dorks |
|
| 15. |
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.(a) Reconnaissance(b) Scanning(c) Gaining access(d) Maintaining accessThe question was asked in an interview for internship.My doubt is from Generic Steps for Security in portion Cyber Security of Cyber Security |
|
Answer» Right option is (b) SCANNING |
|
| 16. |
________ phase in ethical hacking is known as the pre-attack phase.(a) Reconnaissance(b) Scanning(c) Gaining access(d) Maintaining accessThis question was posed to me in exam.This question is from Generic Steps for Security topic in portion Cyber Security of Cyber Security |
|
Answer» Right answer is (b) Scanning |
|
| 17. |
Which of the following is an example of passive reconnaissance?(a) Telephonic calls to target victim(b) Attacker as a fake person for Help Desk support(c) Talk to the target user in person(d) Search about target records in online people databaseThe question was posed to me in an internship interview.My question is based upon Generic Steps for Security in portion Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) Search about TARGET records in ONLINE people DATABASE |
|
| 18. |
Which of the following is an example of active reconnaissance?(a) Searching public records(b) Telephone calls as a help desk or fake customer care person(c) Looking for the target’s details in the database(d) Searching the target’s details in paper filesI got this question during an interview for a job.Origin of the question is Generic Steps for Security in section Cyber Security of Cyber Security |
|
Answer» The CORRECT choice is (B) Telephone CALLS as a HELP desk or fake customer care person |
|
| 19. |
There are ______ subtypes of reconnaissance.(a) 2(b) 3(c) 4(d) 5This question was addressed to me in an online interview.My doubt is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security |
|
Answer» The correct option is (a) 2 |
|
| 20. |
Which of the following is not a reconnaissance tool or technique for information gathering?(a) Hping(b) NMAP(c) Google Dorks(d) NexposeI have been asked this question during an online interview.This question is from Generic Steps for Security in division Cyber Security of Cyber Security |
|
Answer» Correct CHOICE is (d) Nexpose |
|
| 21. |
____________ is the information gathering phase in ethical hacking from the target user.(a) Reconnaissance(b) Scanning(c) Gaining access(d) Maintaining accessThis question was addressed to me in my homework.This intriguing question originated from Generic Steps for Security topic in portion Cyber Security of Cyber Security |
|
Answer» Correct ANSWER is (a) Reconnaissance |
|
| 22. |
How many basic processes or steps are there in ethical hacking?(a) 4(b) 5(c) 6(d) 7This question was addressed to me by my school principal while I was bunking the class.The origin of the question is Generic Steps for Security in division Cyber Security of Cyber Security |
|
Answer» Right option is (C) 6 |
|