Description : What is the attack called “evil twin” a) Rogue access point b) ARP poisoning c) Session hijacking d) MAC spoofing
Last Answer : a) Rogue access point
Description : What port number does HTTPS use a) 53 b) 443 c) 80 d) 21
Last Answer : Basics-of-Hacking
Description : It is powered by ______ encryption tools a) WEP WPA & WPA2 b) WEP c) WPA d) None of these
Last Answer : a) WEP WPA & WPA2
Description : _____is used to detect wireless networks on the windows platform a) Medusa b) NetStumbler c) SQLMap d) Iraon WASP
Last Answer : b) NetStumbler
Description : Cracker is known as a) Black hat b) White hat c) Encrypting d) None of these
Last Answer : a) Black hat
Description : Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these
Last Answer : b) Weakness
Description : CEH stands for a) Certified Ethical Hackers b) Cyber Ethical Hackers c) Computer Ethical Hackers d) None of these
Last Answer : a) Certified Ethical Hackers
Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above
Last Answer : d) All of the above
Description : Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these
Last Answer : b) White hat hacking
Description : Most computer crimes are committed by a) Hackers b) Inteenational spies c) Highly paid computer consultants d) Web designers
Last Answer : a) hackers