BITS 2
BITS 2
[ B]
A. To reset user passwords
B. To gain unauthorized access by obtaining plaintext passwords
C. To encrypt user data
D. To remove malware from the system
2. Which of the following is an example of privilege escalation? [B ]
A. Changing the network password
B. Gaining administrative access from a regular user account
C. Running an application with limited user privileges
D. Disabling a firewall
3. What does ARP stand for? [C ]
A. Address Record Protocol
B. Access Routing Path
C. Address Resolution Protocol
D. Authentication Resolution Path
4. Which encryption method uses the same key for both encryption and
decryption?
A. Public-key encryption [B ]
B. Private-key encryption
C. Hashing
D. Digital signature
5. What is the main purpose of a cryptographic hash function? [B ]
A. To encrypt and decrypt messages
B. To map input data to a fixed-size output
C. To generate private keys for encryption
D. To store passwords in plaintext
6. Which tool is primarily used for packet sniffing? [ C]
A. Burp Suite B NMAP C Wireshark D Nessus
7. Which technique involves manipulating people to disclose confidential
information?
A .SQL injection B.Social engineering [B ]
C.Phishing D.Password cracking
8.What is the main purpose of Burp Suite in ethical hacking? [C ]
A.Network scanning B.Vulnerability scanning
C. Web application security testing D. Malware analysis
9. Which of the following is a side-channel attack? [B ]
A. Phishing B. Timing attack C. Cross-site scripting D.SQL injection
10. .Which filter would you apply in Wireshark to view only HTTP traffic?[ A]
A) tcp.port == 80 B) udp.port == 443 C) icmp D) dns
11. What is the primary function of the Metasploit framework? [B ]
A) firewall configuration B) penetration testing
C) encryption D) software development
12.Which type of attack involves breaking into accounts by guessing passwords?[C
]
A) sql injection B) privilege escalation
C) password cracking D) buffer overflow
13.What does remote code execution allow an attacker to do? [B ]
A) shut down the network B) execute code on the victim’s machine remotely
C) intercept network traffic D) modify firewall rules
14.Which type of attack can be mitigated by strong input validation?[B ]
A) remote code execution B) sql injection
C) password cracking D) privilege escalation
15.Which tool is used in Metasploit to gain interactive access after exploitation?[C ]
A) wireshark B) Nessus C) meterpreter D) burp suite
16.How does ARP spoofing compromise network security? [B ]
A)It encrypts data transmitted over the network
B)It allows attackers to associate their MAC address with the IP of another host
C)It replaces DNS records with malicious ones
D)It provides secure authentication on public networks
17.What is the primary function of public-key encryption? [B ]
A. To secure data using a single key for both encryption and decryption
B. To allow secure communication by using a pair of public and private keys
C. To generate a digital certificate
D. To hash passwords for secure storage
18.How does Wireshark capture network traffic? [B ]
A) It generates network packets
B) It intercepts and logs packets traveling through a network
c) It attacks the network switch
d) It creates packet floods
19.Why is privilege escalation critical in system hacking? [B ]
A) It allows the attacker to maintain low-level access
B) It gives the attacker enhanced privileges on the system
C) It ensures that the attacker can sniff passwords
D) It prevents detection by firewalls
20.How does privilege escalation work in a hacking context? [B ]
A) it redirects traffic to a fake website
B) it involves gaining higher-level access to system resources
C) it injects malicious code into web applications
D) it brute forces user passwords