
Techniques of Hackers BSIT 3A
Authored by Andre Robles
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What hacking phase where the hacker is going to first attempt to find out information about a target before actually attempting an attack?
Reconnaissance Phase
Scanning and Enumeration Phase
Exploitation
Clearing of Tracks
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
They are the type of hacker who uses hacking techniques for legal/ethical purposes.
White hat hacker
Gray hat hackers
Black hat hacker
Green hat hacker
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Hacking of phone systems
Phreaking
Scamming
Telephony
Wiretapping
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of hacker who uses hacking techniques for illegal techniques/purposes?
Black hat hacker
Gray hat hacker
Blue hat hacker
Red hat hacker
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What scanning technique that does not require the attacker to connect to the target system?
Active Scanning
Passive Scanning
Port Scanning
Ping Scanning
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What system is used to detect any incoming network scans?
Intrusion Detection System
Intrusion Protection System
Exclusion Detection System
Network Scanner Protector
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of scanning where it is far more reliable, but may be detected by the target system?
Active Scanning Technique
Passive Scanning
Ping Scan
Port Scanning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?