Hackers and NetSec

Hackers and NetSec

Professional Development

10 Qs

quiz-placeholder

Similar activities

emergency preparedness

emergency preparedness

Professional Development

15 Qs

Kamonwan

Kamonwan

University - Professional Development

5 Qs

Understanding Cyber Threats

Understanding Cyber Threats

Professional Development

10 Qs

Das Sonnensystem

Das Sonnensystem

KG - Professional Development

10 Qs

RIDDLES

RIDDLES

Professional Development

15 Qs

h

h

6th Grade - Professional Development

12 Qs

EJI week 2

EJI week 2

Professional Development

10 Qs

Viren

Viren

Professional Development

10 Qs

Hackers and NetSec

Hackers and NetSec

Assessment

Quiz

Science

Professional Development

Hard

Created by

Hisquare Group

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Hackers who work for goveent secret service would be regarded as

Green hat hackers

Black hat hackers

Grey hat hackers

Red hat hackers

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Greg was playing around in a bank and found out their wifi system has a vulnerability. He decided to do the honourable thing by informing thw bank of his findings. Which type of hacker is Greg?

Green hat

Black hat

Grey hat

White hat

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following only logs strange patterns, activities or behaviours on a network?

Firewall

IPS

IDS

Wireshark

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A firewall which blocks traffic based on whether it is UDP or TCP traffic is working on which layer of the OSI model?

Session

Network

Data link

Transport

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A firewall which blocks traffic based on Mac address filtering is working on which layer of the OSI model?

Session

Network

Data link

Transport

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Blue hat hackers are hackers who

Work to promote a passionate cause or idea

Work to test and secure apps in development

Have attained high reputation among their peers

Do both good and evil based on situation

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

An attack in which the attacker finds a way to modify his ip address to match another person's ip address so as to fool a system is regarded as

Forking

Spoofing

Mapping

DNS Hijacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Science