Foundations of Ethical Hacking

Foundations of Ethical Hacking

University

20 Qs

quiz-placeholder

Similar activities

REVISIÓN DE CONTENIDO HASTA CAPA 3

REVISIÓN DE CONTENIDO HASTA CAPA 3

University

18 Qs

Test cultura

Test cultura

10th Grade - University

20 Qs

Hydrogen and Geothermal Energy Coversion

Hydrogen and Geothermal Energy Coversion

University

20 Qs

Exploring the New Era of Cybersecurity

Exploring the New Era of Cybersecurity

University

15 Qs

FUNDAMENTALS OF BIOMETRIC SECURITY Module 1

FUNDAMENTALS OF BIOMETRIC SECURITY Module 1

University

20 Qs

D29 QUIZ OF THE DAY

D29 QUIZ OF THE DAY

University

25 Qs

Wireless LANs  ICE 3201

Wireless LANs ICE 3201

University

20 Qs

unit1 MCQ

unit1 MCQ

University

15 Qs

Foundations of Ethical Hacking

Foundations of Ethical Hacking

Assessment

Quiz

Engineering

University

Medium

Created by

Vijayakumar Rajarathinam

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the action that might compromise cyber security?

Threat

Attack

Exploit

Vulnerability

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first phase of Hacking?

Installation
Reconnaissance
Exploitation
Covering Tracks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is the oldest phone hacking technique hackers use to make free calls.

Cracking

Phishing

Phreaking

Spamming

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method used to protect against phishing attacks?

Two-factor authentication

Phreaking

Social engineering

Spamming

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Identify the term that describes a weakness in a system that can be exploited by hackers.

Threat

Attack

Vulnerability

Exploit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?

Email

Websites

IP tracer

Web servers

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What phase of ethical hacking is enumeration part of?

 Reconnaissance

Maintaining Access

Gaining Access

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?