Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

quiz-placeholder

Similar activities

Nmap Options, Host Discovery, and Port Scanning

Nmap Options, Host Discovery, and Port Scanning

6th Grade - University

16 Qs

Ethical Hacking

Ethical Hacking

University

15 Qs

cyber security test

cyber security test

University

22 Qs

gdsy

gdsy

University

19 Qs

Cyber Forensics

Cyber Forensics

University

21 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Cyber EOP - Network Devices By Mr. B

Cyber EOP - Network Devices By Mr. B

12th Grade - University

18 Qs

Teknik Penyerangan - Scanning

Teknik Penyerangan - Scanning

University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Stylianos Karagiannis

Used 9+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default database for WPScan vulnerabilities?

SQLite

Local file system

MySQL

PostgreSQL

Remote WPScan API

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is used for password cracking?

Nessus

John the Ripper

Nmap

Burp Suite

Netdiscover

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is a commonly used tool for network scanning?

Nmap

Burp Suite

Wireshark

Nessus

Metasploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WPScan primarily used for?

Monitoring network traffic

Encrypting data

Scanning network ports

Creating malware

Testing the security of WordPress websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool uses wordlists to guess hidden directories and files on a web server?

John the Ripper

Nikto

Gobuster

Nmap

Metasploit

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which tool is commonly used for discovering vulnerabilities in web applications?

Burp Suite

John the Ripper

Wireshark

Nikto

Nmap

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Tshark/Wireshark primarily used for in ethical hacking?

Password cracking

Exploit development

Network packet analysis

Social engineering

Web application scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?