Ethical Hacking Basics: MCQ Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Brian Kelly
B
Brian Kelly
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,005
Questions: 10 | Attempts: 376

SettingsSettingsSettings
Ethical Hacking Basics: MCQ Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

    • A.

      Adware

    • B.

      Malware

    • C.

      Ransomware

    • D.

      Spyware

    Correct Answer
    B. Malware
    Explanation
    Malware refers to harmful programs that are designed to disrupt computer operations, gather sensitive information, or gain unauthorized access to computer systems. It is a broad term that encompasses various types of malicious software, including viruses, worms, Trojans, and more. Unlike adware, which primarily displays unwanted advertisements, or spyware, which secretly monitors a user's activities, malware has a more malicious intent and can cause significant harm to computer systems and data. Ransomware, on the other hand, specifically encrypts a user's files and demands a ransom for their release. Therefore, the correct answer is malware.

    Rate this question:

  • 2. 

    Which of the terms listed below refers to an example of a crypto-malware?

    • A.

      Backdoor

    • B.

      Ransomware

    Correct Answer
    B. Ransomware
    Explanation
    Ransomware is a type of crypto-malware that encrypts a victim's files and demands a ransom in exchange for the decryption key. It is designed to extort money from individuals or organizations by preventing them from accessing their own data. Ransomware has become increasingly prevalent in recent years, causing significant damage and financial loss to victims. Unlike backdoors, which are hidden entry points into a system used for unauthorized access, ransomware focuses on encrypting data to hold it hostage for monetary gain.

    Rate this question:

  • 3. 

    Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

    • A.

      Grayware

    • B.

      Ransomware

    Correct Answer
    B. Ransomware
    Explanation
    Ransomware is a type of malware that limits access to a computer system by encrypting files or locking the entire system until the user fulfills certain demands. This form of malware typically demands a ransom payment in exchange for restoring access to the system or decrypting the files. Unlike grayware, which refers to potentially unwanted software that may not be malicious, ransomware specifically focuses on extorting money or valuable resources from the user.

    Rate this question:

  • 4. 

    A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

    • A.

      Worm

    • B.

      Trojan

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of malicious computer program that can spread itself over a computer network without any assistance from the user. Unlike viruses, worms do not need to attach themselves to a host file or program. Instead, they exploit vulnerabilities in network protocols to replicate and spread across multiple computers, often causing damage to system resources and consuming network bandwidth. Therefore, the correct answer for this question is "Worm".

    Rate this question:

  • 5. 

    A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

    • A.

      Rootkit

    • B.

      Backdoor

    Correct Answer
    A. Rootkit
    Explanation
    A rootkit is a collection of software tools used by a hacker to mask their intrusion and gain unauthorized access to a computer or computer network at an administrator level. It allows the hacker to maintain control over the compromised system while remaining undetected by security measures. Unlike a backdoor, which is a specific method of bypassing authentication, a rootkit is a broader term encompassing various tools and techniques used for stealthy and persistent access.

    Rate this question:

  • 6. 

    Which of the following answers lists an example of spyware?

    • A.

      Packet sniffer

    • B.

      Keylogger

    Correct Answer
    B. Keylogger
    Explanation
    A keylogger is a type of spyware that records every keystroke made on a computer, including passwords, credit card numbers, and other sensitive information. It is typically installed without the user's knowledge and can be used by hackers to steal personal information. Keyloggers can be extremely dangerous as they can silently monitor and collect data, making it a clear example of spyware.

    Rate this question:

  • 7. 

    What is adware?

    • A.

      Unsolicited or undesired electronic messages

    • B.

      Malicious program that sends copies of itself to other computers on the network

    • C.

      Software that displays advertisements

    • D.

      Malicious software that collects information about users without their knowledge

    Correct Answer
    C. Software that displays advertisements
    Explanation
    Adware refers to software that displays advertisements. This type of software is designed to deliver advertisements to users' devices, often in the form of pop-up ads or banners. Adware can be installed on a device knowingly or unknowingly, and it is commonly bundled with free software or downloaded from unreliable sources. While adware itself may not be inherently malicious, it can be intrusive and disruptive to the user experience.

    Rate this question:

  • 8. 

    Malicious software collecting information about users without their knowledge/consent is known as:

    • A.

      Crypto-malware

    • B.

      Ransomware

    • C.

      Adware

    • D.

      Spyware

    Correct Answer
    D. Spyware
    Explanation
    Spyware is a type of malicious software that secretly collects information about users without their knowledge or consent. It is designed to gather personal data such as browsing habits, keystrokes, and login credentials, which can then be used for various malicious purposes such as identity theft or unauthorized access to sensitive information. Unlike other options listed, such as crypto-malware, ransomware, and adware, spyware specifically focuses on covertly gathering user information rather than encrypting files, demanding ransom, or displaying unwanted advertisements.

    Rate this question:

  • 9. 

    A malware-infected networked host under remote control of a hacker is commonly referred to as:

    • A.

      Trojan

    • B.

      Worm

    • C.

      Bot

    • D.

      Honeypot

    Correct Answer
    C. Bot
    Explanation
    A malware-infected networked host under remote control of a hacker is commonly referred to as a "Bot." Bots are malicious software programs that can be used by hackers to gain unauthorized access to a networked host and control it remotely. These infected hosts are often used in large numbers to form a botnet, which can be used for various malicious activities such as launching DDoS attacks, spreading spam, or stealing sensitive information.

    Rate this question:

  • 10. 

    Which type of Trojan enables unauthorized remote access to a compromised system?

    • A.

      Pcap

    • B.

      MaaS

    • C.

      PfSense

    • D.

      RAT

    Correct Answer
    D. RAT
    Explanation
    A Remote Access Trojan (RAT) is a type of Trojan that allows unauthorized remote access to a compromised system. This means that once the system is infected with a RAT, an attacker can gain control over the system from a remote location, without the user's knowledge or consent. This can be used for various malicious purposes, such as stealing sensitive information, spying on the user's activities, or using the compromised system as a launching point for further attacks. Therefore, RATs pose a significant security risk and are commonly used by hackers to gain unauthorized access to systems.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 28, 2020
    Quiz Created by
    Brian Kelly
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.