Search Header Logo

Offensive Security

Authored by Ida B

Engineering

University

Used 3+ times

Offensive Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which will not come under offensive security?

Intrusion Detection

Social Engineering

Red Teaming

Pen Testing

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

__________ is protecting computer systems and networks from attack.

Neither Offensive nor Defensive Security

Offensive Security

Both Offensive & Defensive Security

Defensive Security

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Hackers who seek to take personal revenge.

Black Hat Hackers

Red Hat Hackers

Blue Hat Hackers

Grey Hat Hackers

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Pwd means _______

Present World Directory

Present Working Directory

Present Working Dictionary

Past Working Directory

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Touch command is used to ________.

create a file

delete a file
display file contents

edit the file

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

mv command is used to ______ the file.

delete

rename

copy
create

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

___________ command is used to change the file permissions.

cat

cp

chmod
chmodx

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?