ETHICAL HACKING CT-3 QUIZ

ETHICAL HACKING CT-3 QUIZ

University

20 Qs

quiz-placeholder

Similar activities

SASI Midterm Quiz 1

SASI Midterm Quiz 1

University

18 Qs

Cybersecurity and Privacy Unit 1. 1 Quiz

Cybersecurity and Privacy Unit 1. 1 Quiz

University

25 Qs

Properties of Materials

Properties of Materials

University

15 Qs

TECH WHIZ

TECH WHIZ

University

15 Qs

Ejes y poleas

Ejes y poleas

University

20 Qs

SE CT3 QUIZ

SE CT3 QUIZ

University

20 Qs

Cipher Quest Round 1&2 Combined Set 1

Cipher Quest Round 1&2 Combined Set 1

University

20 Qs

Adel Vocabulary list 1 Midterm

Adel Vocabulary list 1 Midterm

University

20 Qs

ETHICAL HACKING CT-3 QUIZ

ETHICAL HACKING CT-3 QUIZ

Assessment

Quiz

Engineering

University

Easy

Created by

Swathi Kadiyala

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What is the first step in the system hacking process?

A. Gaining Access

B. Escalating Privileges

C. Covering Tracks

D. Installing Keyloggers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Which tool is commonly used for brute-force password attacks?

A. Nmap

B. Burp Suite

C. Hydra

D. Nikto

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What does a keylogger do?

A. Encrypts files

B. Captures keystrokes

C. Prevents logins

D. Cracks passwords using rainbow tables

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of attack uses a precomputed table for password cracking?

A. Brute-force attack

B. Dictionary attack

C. Rainbow table attack

D. Keylogging attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which of the following is a commonly used keylogger?

A. Wireshark

B. Ardamax

C. John the Ripper

D. Metasploit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What is the final step in the system hacking lifecycle?

A. Escalating privileges

B. Covering tracks

C. Gaining access

D. Cracking passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which method tries all possible combinations of characters to find the correct password?

A. Hybrid Attack

B. Dictionary Attack

C. Brute Force Attack

D. Keylogging

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?