Cyber Security Questions and Answers – Attack Vectors – Sniffing

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Attack Vectors – Sniffing”.

1. _____________ is data interception method used by hackers.
a) Phishing
b) DoS
c) Sniffing
d) MiTM

Answer: c
Explanation: Sniffing is data interception method used by hackers. Sniffing is the method used to monitor & capture all data packets passing through any target network using sniffing tools.

2. Sniffing is also known as ___________________
a) network-tapping
b) wiretapping
c) net-tapping
d) wireless-tapping

Answer: b
Explanation: Sniffing which is also known as wiretapping is data interception method used by hackers. It is a technique used for monitoring & capturing all data packets passing through any target network.

3. _____________ are programs or devices that capture the vital information from the target network or particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers

Answer: d
Explanation: Sniffing is data interception method used by cyber-criminals. Sniffers are programs or devices that capture vital information from the target network or particular network.

4. Which of them is not an objective of sniffing for hackers?
a) Fetching passwords
b) Email texts
c) Types of files transferred
d) Geographic location of a user

Answer: d
Explanation: The method used to capture data packets through any target network is called sniffing. The various objectives of sniffing for hackers are fetching passwords, email texts and the type of files transferred.

5. Which of the following tech-concepts cannot be sniffed?
a) Router configuration
b) ISP details
c) Email Traffic
d) Web Traffic

Answer: b
Explanation: Sniffing is data interception method and is not used for sniffing ISP details. It is particularly used for capturing router configuration, email traffic & web traffic.

6. Which of the following tech-concepts cannot be sniffed?
a) Cloud sessions
b) FTP passwords
c) Telnet passwords
d) Chat sessions

Answer: a
Explanation: Sniffing technique is used to monitor packets of target network using sniffer programs. It cannot sniff cloud sessions. It is used to capture and monitor router configuration, Telnet passwords, chat sessions etc.

7. Which of the below-mentioned protocol is not susceptible to sniffing?
a) HTTP
b) SMTP
c) POP
d) TCP

Answer: d
Explanation: The technique used to supervise & confine all data packets through any target network is called sniffing. HTTP, SMTP, POP are some protocols that are susceptible to sniffing.

8. Which of the below-mentioned protocol is not susceptible to sniffing?
a) NNTP
b) UDP
c) FTP
d) IMAP

Answer: b
Explanation: NNTP, FTP, POP and IMAP are some protocols that are susceptible to sniffing. UDP protocol is not susceptible to sniffing attack. Sniffing is mainly used for capturing email traffic, router’s configuration, & web traffic.

9. There are __________ types of sniffing.
a) 2
b) 3
c) 4
d) 5

Answer: a
Explanation: Sniffing is data surveillance technique used by hackers and is used to keep an eye on as well as detain all data packets with the help of sniffing tools. There are two types of sniffing attacks. These are passive sniffing and active sniffing.

10. Active sniffing is difficult to detect.
a) True
b) False

Answer: b
Explanation: Sniffing is like “tapping phone calls” and try to know about any conversation. There are two types of sniffing. These are passive sniffing and active sniffing. Passive sniffing is difficult to detect.

11. Which of the following is not a sniffing tool?
a) Wireshark
b) Dude Sniffer
c) Maltego
d) Look@LAN

Answer: c
Explanation: Packet sniffers are utility tools which are used since the release of Ethernet. List of some of these sniffing tools are Wireshark, Dude Sniffer, Look@LAN etc.

12. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.
a) True
b) False

Answer: a
Explanation: A sniffer on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division. This is how it works to sniff all data packets.

13. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.
a) Phishing site
b) Sniffer tool
c) Password cracker
d) NIC cracker

Answer: b
Explanation: A sniffer tool turns your machine’s NIC to the dissolute mode so that hackers can listen to & observe all your data packets. Hence they can know what type of data is being transmitted and received.

14. In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.
a) passive
b) signal
c) network
d) active

Answer: d
Explanation: Sniffing is like tapping the phone calls & over-heard about any discussion. In active sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.

15. __________________ are those devices which can be plugged into your network at the hardware level & it can monitor traffic.
a) Hardware sniffers & analyzers
b) Hardware protocol analyzers
c) Hardware protocol sniffers
d) Hardware traffic sniffers and observers

Answer: b
Explanation: Sniffing is data interception method which can be done using hardware also. Hardware protocol analyzers are those devices which can be plugged into your network at the hardware level & it can monitor traffic without manipulating it.

Leave a Comment