JSPM’s
RAJARSHI SHAHU COLLEGE OF ENGINEERING,
POLYTECHNIC
Department of Computer Engineering
Academic Year 2023-24
Workbook-5
Course: ETI Course Code: 22618
Course & Code: CO6I Class: TYCO
Semester: Sixth Name of the Faculty: Mrs.S.P.Sabat
Date:
CO 5:Describe Ethical Hacking process.
CHAPTER 5: Basics of Hacking
1.Which of the following is a passive wireless discovery tool?
a NetStumbler
b
Aircrack
c Kismet
d Netsniff
Answer:
2. Which of the following is true regarding WEP cracking?
a Initialization vectors are small, get reused frequently, and are sent in cleartext
b Initialization vectors are small, get reused frequently, but are encrypted during transmission
c
Initialization vectors are large, get reused frequently, and are sent in cleartext
d Initialization vectors are large, get reused frequently, but are encrypted during transmission
Answer:
3.Which of the following statements best describes a white-hat hacker?
a Security professional
b Former black hat
c Former grey hat
d Malicious hacker
Answer:
4.A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
a Grey-box testing
b Black-box testing
c White-box testing
d Active testing
Answer:
5.What is the first phase of hacking?
a Attack
b Maintaining access
c Gaining access
d Reconnaissance
Answer:
6.What type of ethical hack tests access to the physical infrastructure?
a Internal network
b Remote network
c External network
d Physical access
Answer:
7.The security, functionality, and ease of use triangle illustrates which concept?
a As security increases, functionality and ease of use increase.
b As security decreases, functionality and ease of use increase.
c As security decreases, functionality and ease of use decrease.
d Security does not affect functionality and ease of use.
Answer:
8.Which type of hacker represents the highest risk to your network?
a Disgruntled employees
b Black-hat hackers
c Grey-hat hackers
d Script kiddies
Answer:
9.Hacking for a cause is called __________________.
a Active hacking
b Hacktivism
c Activism
d Black-hat hacking
Answer:
10. Which federal law is most commonly used to prosecute hackers?
a Title 12
b Title 18
c Title 20
d Title 2
Answer:
Course Teacher HOD