Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing

University

40 Qs

quiz-placeholder

Similar activities

LATIHAN PYTHON

LATIHAN PYTHON

10th Grade - University

44 Qs

Operating Systems Quiz

Operating Systems Quiz

University

40 Qs

IAS101 - Quiz 5

IAS101 - Quiz 5

University

35 Qs

CS213-SF-Exam

CS213-SF-Exam

University

40 Qs

Fototechnik A.25-05

Fototechnik A.25-05

University

40 Qs

A+ Quiz 12

A+ Quiz 12

University

40 Qs

Cyber Security

Cyber Security

University

40 Qs

Networking Essentials V2 Chapter 4 Review

Networking Essentials V2 Chapter 4 Review

9th Grade - University

41 Qs

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing

Assessment

Quiz

Computers

University

Easy

Created by

Balachander T

Used 2+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Vulnerability Assessment (VA)?

Exploiting systems

Identifying and classifying security weaknesses

Writing malware

Bypassing firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is introduced in Unit 1 for vulnerability scanning?

Metasploit

Nessus

Wireshark

Nmap

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key step after scanning in VA?

Deleting logs

False positive analysis

Formatting the system

Ignoring minor vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase involves exploiting identified vulnerabilities?

Scan configuration

Report interpretation

Vulnerability analysis

Policy configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Penetration Testing (PT)?

Only identifying vulnerabilities

Simulating attacks to exploit vulnerabilities

Installing antivirus software

Writing security policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which framework is introduced for penetration testing in Unit 2?

Burp Suite

Metasploit

Nessus

Snort

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Shodan used for in PT?

Password cracking

Finding internet-connected devices

Encrypting data

Social engineering

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?