Unit 2 - Objective Questions

Unit 2 - Objective Questions

University

23 Qs

quiz-placeholder

Similar activities

PLC Quiz

PLC Quiz

University

25 Qs

Study Skills Quiz

Study Skills Quiz

University

20 Qs

ELPAC Reading Practice

ELPAC Reading Practice

8th Grade - University

21 Qs

Driver ed final1

Driver ed final1

10th Grade - University

18 Qs

AP Psychology Unit 9: Biological Bases of Behavior

AP Psychology Unit 9: Biological Bases of Behavior

10th Grade - University

20 Qs

DS 3361 Chapter 11: Spleen (D)

DS 3361 Chapter 11: Spleen (D)

University

21 Qs

CDP- Session 5

CDP- Session 5

University

20 Qs

Understanding Data Communication

Understanding Data Communication

University

19 Qs

Unit 2 - Objective Questions

Unit 2 - Objective Questions

Assessment

Quiz

Other

University

Medium

Created by

vijeta songire

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Footprinting mainly refers to:

Finding usernames and passwords

Collecting information about a target system

Exploiting system vulnerabilities

Installing backdoors

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is an example of passive footprinting?

Using Nmap scan

Ping sweep

Checking WHOIS records

Port scanning

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Google Dorking is primarily used for:

Encrypting passwords

Searching hidden or sensitive information online

Blocking malware websites

Scanning open ports

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of these is a valid Google Dork operator?

run:

intitle:

-exec:

chmod:

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The process of identifying which hosts are active on a network is called:

Privilege escalation

Host discovery

Banner grabbing

Dictionary attack

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which tool is commonly used for identifying live hosts?

Telnet

Nmap

John the Ripper

Hydra

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

In port scanning, a TCP connect scan:

Skips the handshake process

completes the full three-way handshake

Sends UDP packets only

Hides scanning from firewalls

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?