Phases of Hacking

Phases of Hacking

1st - 3rd Grade

12 Qs

quiz-placeholder

Similar activities

WIFI

WIFI

1st - 10th Grade

8 Qs

Boomerang Quiz #2

Boomerang Quiz #2

3rd - 6th Grade

12 Qs

Anantara Iko Mauritius Resort and Villas

Anantara Iko Mauritius Resort and Villas

1st - 3rd Grade

10 Qs

Art Draw Microsoft Apps

Art Draw Microsoft Apps

3rd Grade

10 Qs

SAISD Trivia

SAISD Trivia

KG - University

10 Qs

iq test

iq test

KG - 11th Grade

11 Qs

Tutorial 3

Tutorial 3

1st - 12th Grade

13 Qs

fnf2

fnf2

1st Grade

7 Qs

Phases of Hacking

Phases of Hacking

Assessment

Quiz

Fun, Specialty

1st - 3rd Grade

Hard

Created by

Mauricio Barboza

Used 103+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the proper order of an Ethical Hacking

Scanning, Maintaining Access, Gaining Access, Planning and Reconnaissance, Covering Tracks, Reporting

Planning and Reconnaissance, Gaining Access, Scanning, Maintaining Access, Covering Tracks, Reporting

Planning and Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks, Reporting

Covering Tracks, Planning and Reconnaissance, Gaining Access, Scanning, Maintaining Access, Reporting

Planning and Reconnaissance, Scanning, Gaining Access, Maintaining Access, Reporting, Covering Tracks,

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The scanning phase is where exploits of the vulnerabilities found are launched

True

False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ethical hackers who work to protect systems and people

Black Hat

White Hat

Grey Hat

Red Hat

Blue Hat

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Amateur hackers who are not qualified. They depend on programs and files to hack and don't bother to learn how they work.

White Hat

Social Media Hacker

Red Hat

Script Kiddie

Green Hat

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Deleting entire logs is the best way to cover your tracks

True

False

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The evidence found in the phases is never delivered to the clients

True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is the phase where the exploits are launched or different techniques are used in order to compromise a team and take control of it?

Gaining Access

Scanning

Maintaining Access

Covering Tracks

Planning and Reconnaissance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?