Vulnerability Scanning and Exploitation Quiz

Vulnerability Scanning and Exploitation Quiz

University

7 Qs

quiz-placeholder

Similar activities

23augNmap, CVE & NVD Quiz

23augNmap, CVE & NVD Quiz

University

10 Qs

Cybersecurity Ess

Cybersecurity Ess

University

10 Qs

exception

exception

University

10 Qs

SysAdmin: Patch Management

SysAdmin: Patch Management

10th Grade - University

10 Qs

Information Assurance & Security

Information Assurance & Security

University

10 Qs

Chapter 13 - Computer Security

Chapter 13 - Computer Security

University

10 Qs

THM Indore

THM Indore

University

12 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

Vulnerability Scanning and Exploitation Quiz

Vulnerability Scanning and Exploitation Quiz

Assessment

Quiz

Computers

University

Hard

Created by

MUHAMMAD 17057

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of vulnerability scanning?

To exploit vulnerabilities in a system

To assess computers, networks, or applications for known vulnerabilities

To perform social engineering attacks

To create network diagrams

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a definition of a vulnerability according to NIST?

A flaw in a system's design that cannot be exploited

A weakness in an information system that could be exploited by a threat source

A type of software bug that is harmless

A method of securing a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability that affects only hardware

A vulnerability that has been patched

A newly discovered vulnerability with no remediation

A vulnerability that is easy to exploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Common Vulnerability Scoring System (CVSS) assess?

The cost of fixing vulnerabilities

The effectiveness of security policies

The severity of computer system security vulnerabilities

The number of vulnerabilities in a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of vulnerability scanning?

Authenticated scans

Unauthenticated scans

Network scans

Service Enumeration

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a software vulnerability?

Social engineering

Hardware design flaw

Network misconfiguration

Buffer overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of an attack using an exploit?

To gather information about the system

To gain access to a system or data

To create a network diagram

To perform vulnerability scanning