Cyber Awarness Education Study Material

Top 50 MCQ Questions on Ethical Hacking – For All Government Examination 2022

Top 50 MCQ Questions on Ethical Hacking - For All Government Examination 2022
Written by Chetan Darji
Rate this post

1. The First Computer Virus is ______________

  1. Sasser
  2. Creeper
  3. Blaster
  4. I Love You

Answer – Creeper

2. What type of symmetric key algorithm using a streaming cipher to encrypt information ?

  1. RC4
  2. Blowfish
  3. SHA
  4. MD5

Answer – RC4

3. Charles Babbage invented

  1. ENIAC
  2. Difference Engine
  3. Electronic Computer
  4. Punched Card

Answer – Difference Engine

4. MCAfee is an Example of

  1. Virus
  2. Quick Heal
  3. Antivirus
  4. Photo Editing Software

Answer- Antivirus

5. What is the Maximum character Linux supports in its filenames?

  1. 8
  2. 128
  3. 256
  4. Unlimited

Answer – 256

6. Which of the following is independent malicious program that need not any host program ?

  1. Trap doors
  2. Trojan horse
  3. Virus
  4. Worm

Answer – Worm

7. Which of the following is NOT an example of a smartcard ?

  1. A Credit card which can be used to operate a mobile phone
  2. An electronic money card e.g. Mondex
  3. A drivers license containing current information about bookings etc
  4. An access control card containing a digitized photo

Answer – An access control card containing a digitized photo

8. Code Red is ___________

  1. Word Processing Software
  2. Antivirus
  3. Virus
  4. Photo Editing Software

Answer – Virus

9. What is the default port number for apache and most web servers ?

  1. 20
  2. 27
  3. 80
  4. 87

Answer – 80

10. A DNS translates a domain name into what ?

  1. Binary
  2. Hex
  3. IP
  4. URL

Answer – IP

11. According to the CIA Triad, which of the below-mentioned element is not considered in the triad ?

  1. Confidentiality
  2. Integrity
  3. Authenticity
  4. Availability

Answer – Authenticity

12. This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?

  1. Confidentiality
  2. Non-repudiation
  3. CIA Triad
  4. Authenticity

Answer – CIA Triad

13. CIA triad is also known as ____________

  1. NIC (Non-repudiation, Integrity, Confidentiality)
  2. AIC (Availability, Integrity, Confidentiality)
  3. AIN (Availability, Integrity, Non-repudiation)
  4. AIC (Authenticity, Integrity, Confidentiality)

Answer – AIC (Availability, Integrity, Confidentiality)

14. _______means the protection of data from modification by unknown users.

  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Non-repudiation

Answer – Non-repudiation

15. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental ?

  1. They help understanding hacking better
  2. They are key elements to a security breach
  3. They help understands security and its components better
  4. They help to understand the cyber-crime better

Answer – They help understands security and its components better

16. Data ________is used to ensure confidentiality.

  1. Encryption
  2. Locking
  3. Deleting
  4. Backup

Answer – Encryption

17. ________ is one of the most secured Linux OS that provides anonymity and incognito option for securing its user data.

  1. Fedora
  2. Tails
  3. Ubuntu
  4. OpenSUSE

Answer – Tails

18. Which of the following OS does not comes under a secured Linux OS list ?

  1. Qubes OS
  2. Tails
  3. Tin Hat
  4. Ubuntu

Answer – Ubuntu

19. ___________ is a Debian-Linux based OS that has 2 VMs(Virtual Machines) that help in preserving users’ data private.

  1. Fedora
  2. Ubuntu
  3. Whonix
  4. Kubuntu

Answer – Whonix

20. Subgraph OS is a Debian based Linux distro which provides harcore anonymity and is approved by Edward Snowden.

  1. True
  2. False

Answer – True

21. Using the _____ account of a UNIX system, one can carry out administrative functions.

  1. root
  2. administrative
  3. user
  4. client

Answer – root

22. In Which year the term hacking was coined ?

  1. 1965-67
  2. 1955-60
  3. 1970-80
  4. 1980-82

Answer – 1955-60

23. From where the term ‘hacker’ first cam to existence ?

  1. MIT
  2. Stanford University
  3. California
  4. Bell’s Lab

Answer – MIT

24. What is the name of the first hacker’s conference ?

  1. DEFCON
  2. OSCON
  3. DEVCON
  4. SECCON

Answer – DEFCON

25. ____________ is the oldest phone hacking techniques used by hackers to make free calls

  1. Phishing
  2. Spamming
  3. Phreaking
  4. Cracking

Answer – Phreaking

About the author

Chetan Darji

Hi, My name is Chetan Darji , and I am the owner and Founder of this website. I am 24 years old, Gujarat-based (India) blogger.
I started this blog on 20th January 2019.

Leave a Comment