You can always press Enter⏎ to continue
Certified Ethical Hacker (CEH) Online Quiz/Test
1
Instructions For Quiz
Quiz Time limit is 20 minutes
This Mock Test has 25 Questions
Each Question is of 1 marks so total 25 marks
Multiple Choice Questions(MCQ) with only ONE valid answer
Previous
Next
Submit
Press
Enter
2
Name
Previous
Next
Submit
Press
Enter
3
Email
*
This field is required.
Get Result on your Email address
Previous
Next
Submit
Press
Enter
4
1) Name the hacker who uses hacking to send social, religious, and political, etc messages. This is, usually, done by hijacking websites and leaving a message on the hijacked website
*
This field is required.
Hacktivist
Phone phreaker
White hat hacker
Grey hat hacker
Previous
Next
Submit
Press
Enter
5
2) The _____ defines a threat is the potential cause of an incident that may result in harm of systems and organization
*
This field is required.
ISO 27001
ISO 27000
ISO 27002
ISO 27005
Previous
Next
Submit
Press
Enter
6
3) Using SQL injection, to by-pass web application login algorithms that are weak, delete data from the database, etc
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
7
4) A ______ who gains access to systems with a view to fix the identified weaknesses
*
This field is required.
Black hat hacker
Grey hat hacker
Script kiddie
White hat hacker
Previous
Next
Submit
Press
Enter
8
5) The password cracking utility John The Ripper is cross platform
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
9
6)NetStumbler is cross platform and open source tool
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
10
7)A ____ is a program that allows the attack to control the user's computer from a remote location
*
This field is required.
Virus
Trojan Horse
Worm
Keylogger
Previous
Next
Submit
Press
Enter
11
8)A worm is not a malicious computer program
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
12
9)____is the art of exploiting the human elements to gain access to un-authorized resources
*
This field is required.
Organization
Social Engineering
Hacking
Reverse Engineering
Previous
Next
Submit
Press
Enter
13
10) SHA-512 encryption uses ____ bit words
*
This field is required.
32
512
64
256
Previous
Next
Submit
Press
Enter
14
11) How many number of bits are used by IPv6
*
This field is required.
64
32
24
128
Previous
Next
Submit
Press
Enter
15
12) Which service runs on port 21
*
This field is required.
FTP
HTTP
SMTP
TELNET
Previous
Next
Submit
Press
Enter
16
13) ____ is used to intercept packages as they are transmitted over the network
*
This field is required.
MAC flooding
Active Sniffing
Passive Sniffing
Network Sniffing
Previous
Next
Submit
Press
Enter
17
14) Telnet service runs on which Port number
*
This field is required.
21
22
23
24
Previous
Next
Submit
Press
Enter
18
15) Which attack is used to crash Web Server
*
This field is required.
SQL Injection
ARP poisoning
DOS attack
Distributed DOS attacks
Previous
Next
Submit
Press
Enter
19
16)The ____ attack used to compromise the DNS servers to redirect all the traffic to a malicious site
*
This field is required.
Pharming
Directory transversal attacks
DOS attack
Sniffing
Previous
Next
Submit
Press
Enter
20
17)Patch management is use of software code to fix bugs and secure the software
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
21
18)Name the tool that can be used to install, delete & replicate programs
*
This field is required.
Zeus
Metasploit
Mpack
Neosploit
Previous
Next
Submit
Press
Enter
22
19)Can we change the default services port number like for FTP?
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
23
20)The Encrypted information is known as a ____
*
This field is required.
Cipher
Public key
Encrypted text
Private key
Previous
Next
Submit
Press
Enter
24
21)Brute force attack uses wordlist to crack a passwords
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
25
22)Rainbow table attack uses the algorithms that try to guess all possible logical combination to crack the password
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
26
23)Active cracking is more effective than passive cracking
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
27
24)This attack involves eavesdropping on a network and capturing sensitive information
*
This field is required.
Man In The Middle attack
Sniffing attack
Denial of service attack
SQL injection attacks
Previous
Next
Submit
Press
Enter
28
25)A good security policy can help to protect a network
*
This field is required.
TRUE
FALSE
Previous
Next
Submit
Press
Enter
Should be Empty:
Question Label
1
of
28
See All
Go Back
Submit