Search Header Logo

Vulnerability Scanning and Exploitation Quiz

Authored by MUHAMMAD 17057

Computers

University

Vulnerability Scanning and Exploitation Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of vulnerability scanning?

To exploit vulnerabilities in a system

To assess computers, networks, or applications for known vulnerabilities

To perform social engineering attacks

To create network diagrams

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a definition of a vulnerability according to NIST?

A flaw in a system's design that cannot be exploited

A weakness in an information system that could be exploited by a threat source

A type of software bug that is harmless

A method of securing a network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability that affects only hardware

A vulnerability that has been patched

A newly discovered vulnerability with no remediation

A vulnerability that is easy to exploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Common Vulnerability Scoring System (CVSS) assess?

The cost of fixing vulnerabilities

The effectiveness of security policies

The severity of computer system security vulnerabilities

The number of vulnerabilities in a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of vulnerability scanning?

Authenticated scans

Unauthenticated scans

Network scans

Service Enumeration

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a software vulnerability?

Social engineering

Hardware design flaw

Network misconfiguration

Buffer overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of an attack using an exploit?

To gather information about the system

To gain access to a system or data

To create a network diagram

To perform vulnerability scanning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?