
Hacking Scenarios
Computers
University
Used 349+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following statements best describes a white-hat hacker?
Security professional
Former black hat
Former gray hat
Malicious hacker
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A security audit performed on the internal network of an organization by the network administration is also known as:
Gray-box testing
Black-box testing
White-box testing
Active testing
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the first phase of hacking?
Attack
Maintaining access
Gaining access
Reconnaissance
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What type of ethical hack tests access to the physical infrastructure?
Internal network
Remote network
External network
Physical access
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The security, functionality, and ease of use triangle illustrates which concept?
As security increases, functionality and ease of use increase
As security decreases, functionality and ease of use increase
As security decreases, functionality and ease of use decrease
Security does not affect functionality and ease of use
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which type of hacker represents the highest risk to your network?
Disgruntled employees
Black-hat hackers
Gray-hat hackers
Script kiddies
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Hacking for a cause is called:
Active hacking
Hacktivism
Activism
Black-hat hacking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?