FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

quiz-placeholder

Similar activities

Network Security 3

Network Security 3

University

32 Qs

CPET 18L Pre-Midterm Exam

CPET 18L Pre-Midterm Exam

University

30 Qs

Chapter 2 Vulnerabilites, Threats & Attacks

Chapter 2 Vulnerabilites, Threats & Attacks

University

26 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

25 Qs

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

9th Grade - University

25 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

Information Assurance and Security - Prelim Quiz

Information Assurance and Security - Prelim Quiz

University

25 Qs

Cybersecurity Essentials Chapter 1 Review

Cybersecurity Essentials Chapter 1 Review

10th Grade - University

25 Qs

FIREWALL ️‍🔥

FIREWALL ️‍🔥

Assessment

Quiz

Computers

University

Hard

Created by

Drive Dev

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the primary focus of ethical hacking?
Data theft
System exploitation
Security testing
Financial gain

2.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Hardware hacking primarily involves:
Software development
Manipulating physical devices
Cracking passwords
Social engineering

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

In a deauthentication attack, the attacker:
Sends viruses to the network
Sends fake deauthentication packets
Modifies access points
Cracks network passwords

4.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

A common goal of Wi-Fi handshake capture is:
Device damage
Password cracking
Data encryption
Malware installation

5.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which hardware is commonly used in deauthentication attacks?
SDR
BadUSB
Wi-Fi adapter
Bluetooth dongle

6.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which of these is a method for password cracking?
Social engineering
Dictionary attack
Network scanning
Packet analysis

7.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

What is the goal of ethical hacking?
Data exploitation
System protection
System failure
Privacy violation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?