Ethical Hacking

Ethical Hacking

Professional Development

50 Qs

quiz-placeholder

Similar activities

SY0-501 Practice Quiz 8

SY0-501 Practice Quiz 8

Professional Development

50 Qs

Security+ Authentication Design Concepts

Security+ Authentication Design Concepts

Professional Development

50 Qs

CSI-Student Chapter Technical Quiz

CSI-Student Chapter Technical Quiz

Professional Development

50 Qs

Cyber Security OFIL

Cyber Security OFIL

Professional Development

51 Qs

Linux Test Prep 2

Linux Test Prep 2

8th Grade - Professional Development

55 Qs

Java String-2

Java String-2

Professional Development

55 Qs

Java Array

Java Array

Professional Development

55 Qs

Polymorphism & Exception Handling in Java

Polymorphism & Exception Handling in Java

Professional Development

53 Qs

Ethical Hacking

Ethical Hacking

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Avinash Borse

Used 17+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maintaining access

Gaining access

Reconnaissance

Scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many phases are there in hacking?

4

5

7

6

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the information gathering phase in ethical hacking from the target user.

Reconnaissance

Scanning

Gaining access

Maintaining access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a reconnaissance tool or technique for information gathering?

NMAP

Hping

whois lookup

Nexpose

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are ______ subtypes of reconnaissance.

2

3

4

5

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of active reconnaissance?

Searching public records

Telephone calls as a help desk or fake customer care person

Looking for the target’s details in the database

Searching the target’s details in paper files

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.

Fingerprinting

3D printing

Footprinting

Data printing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?