Pentest Unit 1 Revision

Pentest Unit 1 Revision

University

13 Qs

quiz-placeholder

Similar activities

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

9th Grade - University

10 Qs

CIS1103 Week 11-12 CLO 5 Security

CIS1103 Week 11-12 CLO 5 Security

University

16 Qs

Gamble CompSec Allies

Gamble CompSec Allies

University

10 Qs

Ethical Hacking

Ethical Hacking

University

15 Qs

Average level

Average level

University

15 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Pentest Unit 1 Revision

Pentest Unit 1 Revision

Assessment

Quiz

Computers

University

Medium

Created by

Jenefa Engineering

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the role of a penetration tester?

Develops malware for organizations

Secures software by obfuscating code

Simulates attacks to identify vulnerabilities

Monitors social media for cyber threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of hacker has legal permission to test systems?

Black Hat

Grey Hat

Script Kiddie

White Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the Penetration Testing Methodology?

Exploitation

Vulnerability Analysis

Reconnaissance

Reporting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of vulnerability scanning?

To block unauthorized users from accessing a network

To automatically detect known vulnerabilities

To perform social engineering attacks

  1. To restore files after a breach

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these tools is commonly used for vulnerability assessment?

Wireshark

Burp Suite

Nessus

Hydra

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'C' in the CIA triad stand for?

Control

Confidentiality

Compliance

Configuration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a logical security control?

Security awareness training

Antivirus software

Hiring a security officer

Backup policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?