Recent questions tagged basics-of-hacking

Description : What is the attack called “evil twin” a) Rogue access point b) ARP poisoning c) Session hijacking d) MAC spoofing

Last Answer : a) Rogue access point

Description : What port number does HTTPS use a) 53 b) 443 c) 80 d) 21

Last Answer : Basics-of-Hacking

Description : It is powered by ______ encryption tools a) WEP WPA & WPA2 b) WEP c) WPA d) None of these

Last Answer : a) WEP WPA & WPA2

Description : _____is used to detect wireless networks on the windows platform a) Medusa b) NetStumbler c) SQLMap d) Iraon WASP

Last Answer : b) NetStumbler

Description : Cracker is known as a) Black hat b) White hat c) Encrypting d) None of these

Last Answer : a) Black hat

Description : Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these

Last Answer : b) Weakness

Description : CEH stands for a) Certified Ethical Hackers b) Cyber Ethical Hackers c) Computer Ethical Hackers d) None of these

Last Answer : a) Certified Ethical Hackers

Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above

Last Answer : d) All of the above

Description : Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these

Last Answer : b) White hat hacking

Description : Most computer crimes are committed by a) Hackers b) Inteenational spies c) Highly paid computer consultants d) Web designers

Last Answer : a) hackers

To see more, click for the full list of questions or popular tags.