Ethical Hacking Solved MCQ
Ethical Hacking Solved MCQ contain set of 10 MCQ questions for Ethical Hacking MCQ which will help you to clear beginner level quiz.
1) Which of the following items is unique to the N-tier architecture method of designing software Applications?
- Application layers can be separated, allowing each layer to be upgraded independently from other layers.
- Application layers can be written in C, ASP.NET or Delphi without any performance loss
- It is compatible with various database including access, oracle and SQL
- Data security is tied into each layer and must be updated for all layers when any upgrade is performed
2) What is the meaning of NOP?
- None of these
- No Operation
- Network Operation
- No one Point
3) To bypass IDS during a buffer overflow attack, you would:
- Replace the NOP instruction with other code segments.
- Any of these
- Include neither NOP instructions nor code segments
- Replace the code segments with NOP instructions
4) To prevent session hijacking, you would use:
- Encryption
- IDS
- Multi-factor authentication
- Firewall
5) An attacker attempts to cover his tracks by entering this command: rm –rf/var/log/messages. Here, ‘r’
in rf stands for what?
- Remove
- Redirect
- Render
- Recursive
6) In an attack, after disabling the auditing on the system you have hacked is sure to:
- Not tamper with event logs
- Erase relevant events logs
- Append an entry to event log
- None of these
7) Which of these tools can be used for the purpose of anti-forensics?
- Acunetix
- Truecrypt
- Nmap
- Nikto
8) The method where a stego is sent in information embedded within normal traffic is what?
- Cipher text
- Hidden directory
- Covert channels
- Encryption
9) Cryptography and steganography are often related in terms of technology. Cryptographic techniques do what to messages?
- Copyright
- Alter
- Scramble
- Camouflage
10) Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
- Passive
- Intuitive
- Reactive
- Detective