
Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is not suitable for web server scanning?
Nessus
Nikto
Victor
Rekon
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the Nmap command with '-F' signify?
Ping Scan
TCP Scan
Quick Scan
Stealth Scan
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption algorithm is used in the shadow file of Kali Linux?
DES
AES
SHA
MD5
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What port number is used by DNS?
53
25
80
443
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is used to create word lists in Kali Linux?
Crunch
Dimitri
Nikto
John
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of knowledge is associated with gray box testing?
Advanced knowledge
Complete knowledge
Partial knowledge
No knowledge
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is used for time synchronization?
NTP
NAT
DHCP
ASN
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?