Search Header Logo

Hacking quiz

Authored by Nonu goyal

Computers

University

Used 19+ times

Hacking quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Handshake Protocol uses which type of encryption :

MD5

Asymmetric

symmetric

handshake does't use any type of encryption.

2.

FILL IN THE BLANK QUESTION

30 sec • 2 pts

cyber security people never indulge in _____ type of activities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In software reverse engineering, is there any possibility to run the software after putting the malicious code between the software along with cracking?

Yes

No

Maybe

4.

FILL IN THE BLANK QUESTION

45 sec • 4 pts

Why we use port forwarding?

5.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

list is different from tuple in what circumstances?

list is immutable

tuple is mutable

parenthesis

all of the above

6.

MULTIPLE SELECT QUESTION

20 sec • 4 pts

The different types of arithmetic operators include:

equal to

addition

exponentition

all of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Media Image

Is the website safe to surf or login?

yes

no

don't know

don't click on cookies of this website

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?