Ethical Hacking and Social Engineering_Midterm

Ethical Hacking and Social Engineering_Midterm

12th Grade

46 Qs

quiz-placeholder

Similar activities

Ujian Akhir Semester 1

Ujian Akhir Semester 1

8th Grade - University

45 Qs

UH 2-12-1

UH 2-12-1

12th Grade

50 Qs

KUIZ ICT TERBUKA

KUIZ ICT TERBUKA

9th - 12th Grade

50 Qs

Quiz Perangkat Keras dan Lunak Komputer

Quiz Perangkat Keras dan Lunak Komputer

12th Grade

49 Qs

Ethical Hacking and Social Engineering_Midterm

Ethical Hacking and Social Engineering_Midterm

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Regino Vll Guinto

Used 6+ times

FREE Resource

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a vulnerability in cybersecurity?

An authorized system feature

A flaw or weakness that can be exploited

A protective security measure

A user access policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of vulnerability scanning?

To track user activities

To identify weaknesses in a system

To monitor system performance

To encrypt sensitive data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is commonly used to assess system vulnerabilities?

Wireshark

Metasploit

OpenVAS

Hashcat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in a vulnerability analysis process?

Prioritizing risks

Scanning the system

Identifying vulnerabilities

Reporting findings

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to prioritize vulnerabilities after detection?

To comply with legal standards

To maximize hardware efficiency

To focus on the most critical risks first

To reduce the system load

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes social engineering?

Hacking computer software directly

Manipulating people to gain unauthorized access

Developing social networking applications

Using encryption to protect data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What psychological principle is often exploited in social engineering?

Human curiosity

System performance

Hardware reliability

Software compatibility

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?