Ethical Hacking MCQ
Ethical Hacking MCQ
Which nmap command is used TCP Xmas nmap -sT -p -pN nmap -sX -p -pN
15
Tree scan? 172.16.45.129 172.16.45.129
Which scanning technique completes a full
16 TCP connect scan TCP syn scan
three-way handshake
Which command in LINUX is used to
17 chmod chgrp
change the user group of a file?
What is the command to grant all chmod ugo+rwx
18 chmod u=a file_name
permissions on a file to all user? file_name
19 What port number does DNS use? 53 51
How many number of total ports are
20 65533 65536
available on every computer?
HACKING
Option3 Option4 Correct
P Testing All are correct Option4
Kernel Level
Hypervisor Level Rootkit Option4
Rootkit
80 21 Option2
The ethical hacker does not The ethical hacker
use the same techniques or does it strictly for Option1
skills as a cracker financial motives
unlike a cracker.
Exploitation Maintaining Access Option1
/bin/password /bin/shadow Option2
Former gray hat Malicious hacker Option1
Activisim Active hacking Option1
chmod ugo+r
chmod ugo=r file_name Option1
file_name
52 55 Option1
65550 62450 Option2