Techniques of Hackers BSIT 3A

Techniques of Hackers BSIT 3A

University

12 Qs

quiz-placeholder

Similar activities

Komputer dan masyarakat

Komputer dan masyarakat

University

10 Qs

Gamble CompSec Allies

Gamble CompSec Allies

University

10 Qs

CNET151 Chapt 11 Network & Vulnerability Scanning

CNET151 Chapt 11 Network & Vulnerability Scanning

University

15 Qs

Quiz 04 do CyberGames

Quiz 04 do CyberGames

University

11 Qs

Buổi 7

Buổi 7

University

15 Qs

hacking

hacking

University

10 Qs

Chapter 5- Scanning

Chapter 5- Scanning

University

13 Qs

Enumeration

Enumeration

University

14 Qs

Techniques of Hackers BSIT 3A

Techniques of Hackers BSIT 3A

Assessment

Quiz

Computers

University

Medium

Created by

Andre Robles

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What hacking phase where the hacker is going to first attempt to find out information about a target before actually attempting an attack?

Reconnaissance Phase

Scanning and Enumeration Phase

Exploitation

Clearing of Tracks

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

They are the type of hacker who uses hacking techniques for legal/ethical purposes.

White hat hacker

Gray hat hackers

Black hat hacker

Green hat hacker

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacking of phone systems

Phreaking

Scamming

Telephony

Wiretapping

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of hacker who uses hacking techniques for illegal techniques/purposes?

Black hat hacker

Gray hat hacker

Blue hat hacker

Red hat hacker

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What scanning technique that does not require the attacker to connect to the target system?

Active Scanning

Passive Scanning

Port Scanning

Ping Scanning

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What system is used to detect any incoming network scans?

Intrusion Detection System

Intrusion Protection System

Exclusion Detection System

Network Scanner Protector

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of scanning where it is far more reliable, but may be detected by the target system?

Active Scanning Technique

Passive Scanning

Ping Scan

Port Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?