Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

__________ is the last phase of ethical hacking process.(a) Scanning(b) Tracks clearing(c) Reconnaissance(d) ReportingThe question was posed to me during an interview for a job.The doubt is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security

Answer» CORRECT answer is (d) Reporting

To explain I WOULD say: In the reporting phase, the penetration TESTER or ethical hacker has to assemble all the flaws along with the tools and PROCESSES used for DETECTING then and report it to the firm or organization.
2.

Which of the following is not a footprint-scanning tool?(a) SuperScan(b) TcpView(c) Maltego(d) OWASP ZedThis question was posed to me during an internship interview.Enquiry is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security

Answer»

The correct answer is (C) Maltego

Easiest explanation: SUPERSCAN, TCPVIEW and OWASP ZED are tools used for scanning footprints. Maltego is not a footprint-scanning tool. It is used for reconnaissance purpose only.

3.

Which of them is not a track clearing technique?(a) Altering log files(b) Tunnelling(c) Port Scanning(d) Footprint removingI had been asked this question during an online exam.My query is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security

Answer»

The correct CHOICE is (C) Port Scanning

For explanation: Port scanning is a method used in the scanning phase. Altering or changing log FILES, tunnelling for hiding your identity and REMOVING footprints from different sites are EXAMPLES of clearing tracks.

4.

In _______ phase, the hackers try to hide their footprints.(a) Scanning(b) Tracks clearing(c) Reconnaissance(d) Gaining accessThis question was addressed to me in quiz.My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security

Answer»

The correct CHOICE is (B) Tracks clearing

To explain I would say: Tracks clearing or covering tracks is the name of the PHASE where the hackers delete logs of their existence & other activity records they do during the hacking process. This step is actually an unethical ONE.

5.

Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?(a) Rootkits(b) Backdoors(c) Trojans(d) WiresharkI had been asked this question during an online interview.This intriguing question comes from Generic Steps for Security topic in portion Cyber Security of Cyber Security

Answer»

The correct answer is (d) WIRESHARK

Easiest explanation: Wireshark is not a tool for maintaining access because it is used for ANALYSING network protocols at a microscopic level (very minutely). It is an INTERACTIVE tool for DATA traffic analysing on any computer.

6.

_______ is the tool used for this purpose.(a) Powersploit(b) Aircrack – ng(c) Snort(d) NmapThe question was asked by my school principal while I was bunking the class.Asked question is from Generic Steps for Security in section Cyber Security of Cyber Security

Answer»

The CORRECT option is (a) Powersploit

Explanation: The Powersploit is an access MAINTAINING tool used for Windows SYSTEMS. This tool is used for GAINING re-access to the victim’s system using PowerShell.

7.

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.(a) security officer(b) malicious hacker(c) security auditor(d) network analystThis question was addressed to me by my college director while I was bunking the class.This interesting question is from Generic Steps for Security topic in portion Cyber Security of Cyber Security

Answer» CORRECT ANSWER is (b) MALICIOUS hacker

Explanation: Malicious hackers can GAIN illegal access at OS level, APPLICATION level or network level if the penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a system.
8.

In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?(a) Scanning(b) Maintaining access(c) Maintaining Access(d) Gaining accessThe question was posed to me in an online quiz.My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security

Answer»

Correct choice is (c) Maintaining Access

For explanation: After gaining access to a system, the hacker needs to keep a path OPEN so that he/she in FUTURE can access the system. Therefore, BACKDOORS are SET which will later allow the attacker to gain access through it EASILY.

9.

Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?(a) Maltego(b) NMAP(c) Metasploit(d) NessusI had been asked this question by my college director while I was bunking the class.Question is from Generic Steps for Security topic in section Cyber Security of Cyber Security

Answer» RIGHT CHOICE is (c) Metasploit

Easy explanation: Metasploit is a framework and the most widely used penetration TESTING TOOL used by ethical HACKERS for testing the vulnerabilities in a system or network.
10.

Which of the following is not done in gaining access phase?(a) Tunnelling(b) Buffer overflow(c) Session hijacking(d) Password crackingI have been asked this question in class test.Question is taken from Generic Steps for Security topic in section Cyber Security of Cyber Security

Answer»

The correct option is (a) Tunnelling

The explanation is: Tunnelling is a method that is followed to cover tracks CREATED by attackers and erasing digital FOOTPRINTS. BUFFER overflow, session hijacking and password cracking are examples of GAINING access to test the flaw in system or network.

11.

In __________ phase the hacker exploits the network or system vulnerabilities.(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThe question was posed to me in examination.I would like to ask this question from Generic Steps for Security topic in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (d) Gaining access

Easiest explanation: Penetration testers after SCANNING the SYSTEM or network tries to EXPLOIT the flaw of the system or network in “gaining access” phase.

12.

Which of the following comes after scanning phase in ethical hacking?(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThis question was posed to me in semester exam.The doubt is from Generic Steps for Security topic in section Cyber Security of Cyber Security

Answer»

Right answer is (d) Gaining access

The EXPLANATION is: Gaining access is the next step after scanning. Once the scanning tools are used to LOOK for flaws in a SYSTEM, it is the next PHASE where the ethical hackers or penetration testers have to TECHNICALLY gain access to a network or system.

13.

Which of them is not a scanning tool?(a) NMAP(b) Nexpose(c) Maltego(d) NessusI had been asked this question in an interview.Query is from Generic Steps for Security in division Cyber Security of Cyber Security

Answer»

The correct option is (C) Maltego

The explanation is: NMAP is used for both RECONNAISSANCE and scanning purposes. Nepose and Nessus are fully scanning TOOL. Maltego is an example of a reconnaissance tool used for acquiring information about target user.

14.

Which of them does not comes under scanning methodologies?(a) Vulnerability scanning(b) Sweeping(c) Port Scanning(d) Google DorksI got this question in quiz.My doubt is from Generic Steps for Security topic in portion Cyber Security of Cyber Security

Answer»

The correct answer is (d) Google Dorks

The BEST I can EXPLAIN: Google dork is used for RECONNAISSANCE, which uses special search queries for NARROWING down the search results. The rest THREE scanning methodologies are used for scanning ports (logical), and network vulnerabilities.

15.

While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.(a) Reconnaissance(b) Scanning(c) Gaining access(d) Maintaining accessThe question was asked in an interview for internship.My doubt is from Generic Steps for Security in portion Cyber Security of Cyber Security

Answer»

Right option is (b) SCANNING

Best explanation: Scanning is DONE to look for entry points in a NETWORK or system in order to LAUNCH an attack and check whether the system is PENETRABLE or not.

16.

________ phase in ethical hacking is known as the pre-attack phase.(a) Reconnaissance(b) Scanning(c) Gaining access(d) Maintaining accessThis question was posed to me in exam.This question is from Generic Steps for Security topic in portion Cyber Security of Cyber Security

Answer»

Right answer is (b) Scanning

The best I can EXPLAIN: In the scanning phase, the HACKER actively SCANS for the vulnerabilities or SPECIFIC information in the network which can be exploited.

17.

Which of the following is an example of passive reconnaissance?(a) Telephonic calls to target victim(b) Attacker as a fake person for Help Desk support(c) Talk to the target user in person(d) Search about target records in online people databaseThe question was posed to me in an internship interview.My question is based upon Generic Steps for Security in portion Cyber Security of Cyber Security

Answer»

Correct answer is (d) Search about TARGET records in ONLINE people DATABASE

The explanation: Passive reconnaissance is all about acquiring of information about the target indirectly, HENCE searching any information about the target on online people database is an example of passive reconnaissance.

18.

Which of the following is an example of active reconnaissance?(a) Searching public records(b) Telephone calls as a help desk or fake customer care person(c) Looking for the target’s details in the database(d) Searching the target’s details in paper filesI got this question during an interview for a job.Origin of the question is Generic Steps for Security in section Cyber Security of Cyber Security

Answer»

The CORRECT choice is (B) Telephone CALLS as a HELP desk or fake customer care person

The best explanation: As active reconnaissance is all about interacting with target victim directly, hence telephonic calls as a legitimate customer care person or help desk person, the attacker can get more information about the target user.

19.

There are ______ subtypes of reconnaissance.(a) 2(b) 3(c) 4(d) 5This question was addressed to me in an online interview.My doubt is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security

Answer»

The correct option is (a) 2

Easy explanation: Reconnaissance can be done in two different ways. 1^st, ACTIVE Reconnaissance which involves interacting with the TARGET user or system directly in order to GAIN information; 2^nd, PASSIVE Reconnaissance, where information gathering from target user is done INDIRECTLY without interacting with the target user or system.

20.

Which of the following is not a reconnaissance tool or technique for information gathering?(a) Hping(b) NMAP(c) Google Dorks(d) NexposeI have been asked this question during an online interview.This question is from Generic Steps for Security in division Cyber Security of Cyber Security

Answer»

Correct CHOICE is (d) Nexpose

Easy EXPLANATION: Hping, NMAP & Google Dorks are tools and techniques for reconnaissance. Nexpose is a tool for scanning the network for VULNERABILITIES.

21.

____________ is the information gathering phase in ethical hacking from the target user.(a) Reconnaissance(b) Scanning(c) Gaining access(d) Maintaining accessThis question was addressed to me in my homework.This intriguing question originated from Generic Steps for Security topic in portion Cyber Security of Cyber Security

Answer»

Correct ANSWER is (a) Reconnaissance

Easiest EXPLANATION: Reconnaissance is the phase where the ethical hacker TRIES to GATHER different KINDS of information about the target user or the victim’s system.

22.

How many basic processes or steps are there in ethical hacking?(a) 4(b) 5(c) 6(d) 7This question was addressed to me by my school principal while I was bunking the class.The origin of the question is Generic Steps for Security in division Cyber Security of Cyber Security

Answer»

Right option is (C) 6

To ELABORATE: ACCORDING to the standard ethical hacking standards, the entire process of hacking can be divided into 6 steps or PHASES. These are: Reconnaissance, Scanning, Gaining Access, Maintaining Access, Tracks CLEARING, reporting.