Professional Documents
Culture Documents
Info.Sec Interns Questionnaires v1.1
Info.Sec Interns Questionnaires v1.1
Info.Sec Interns Questionnaires v1.1
Pre-Screening Questionnaires
Chapter – 1
1. The initial phase of ethical hacking is?
A. DNS poisoning
B. Footprinting
C. ARP-poisoning
D. Enumeration
Answer: B ( In this Phase, The attacker attempts to find as many attack vectors as
he can, reconnaissance is another term for footprinting)
6. When any IT device, service, or system requires security checks, the term
“security testing” is employed.?
A. Threat
B. Vulnerability
C. Objective of evaluation
D. Attack
Answer: C ( When any IT system, device, or platform requires assessment for safety
purposes or to address any faults after being evaluated by security researchers, the
term “objective of evaluation” is used)
9. The term “protection from ______of source code” refers to limiting access to
the source code to just authorised individuals.
A. disclosure
B. alteration
C. destruction
D. log of changes
Answer: C
Q3. What is the difference between Black Box Testing and White Box Testing?
A. White Box Testing only tests network systems, while Black Box Testing tests both network and
application systems
B. Black Box Testing is performed internally, while White Box Testing is performed by external
organizations
C. White Box Testing does not provide any knowledge of the system being tested, while Black Box
Testing provides complete knowledge of the system
D. Black Box Testing does not provide any knowledge of the system being tested, while White Box
Testing provides complete knowledge of the system
Q4. What is the main difference between a vulnerability assessment and a penetration test?