
Exploring Ethical Hacking Techniques
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Easy
Sakthivel Duraisamy
Used 12+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is footprinting in ethical hacking?
Footprinting is the process of gathering information about a target system or network in ethical hacking.
Footprinting refers to the act of deleting unnecessary files from a system.
Footprinting is the process of securing a network against attacks.
Footprinting is a method used to encrypt data in transit.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Name two information gathering techniques used in footprinting.
Social engineering
IP address scanning
DNS enumeration, WHOIS lookup
Port scanning
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of network scanning tools?
To increase network speed and performance.
The purpose of network scanning tools is to discover devices, identify open ports, and assess security vulnerabilities on a network.
To create backups of network data.
To monitor internet usage of employees.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
List three popular network scanning tools.
PingPlotter
Nmap, Wireshark, Angry IP Scanner
Fiddler
NetSpot
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a port scanner work?
A port scanner monitors network traffic for security breaches.
A port scanner is used to encrypt data during transmission.
A port scanner sends requests to various ports on a target to identify open, closed, or filtered ports.
A port scanner only checks the speed of the internet connection.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between active and passive scanning?
Active scanning only works on wireless networks.
Active scanning sends requests to discover devices, while passive scanning monitors traffic without interaction.
Passive scanning requires user interaction to function.
Active scanning is slower than passive scanning.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define social engineering in the context of cybersecurity.
Social engineering is the psychological manipulation of people to obtain confidential information for fraudulent purposes.
A strategy for increasing software performance.
A technique for improving user interface design.
A method to enhance network security through encryption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Online Platform Block Q
Quiz
•
11th - 12th Grade
20 questions
City & Guilds Award in Business Processes
Quiz
•
12th Grade
11 questions
What is a computer
Quiz
•
KG - University
10 questions
PRE-ASSESSMENT ETECH M1
Quiz
•
12th Grade
10 questions
Managing and Formatting Word Documents
Quiz
•
12th Grade
15 questions
emptech L1 A
Quiz
•
12th Grade
15 questions
Disk Management and Boot Sequence Vocab
Quiz
•
9th - 12th Grade
10 questions
Working with tables
Quiz
•
5th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
