Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of virus is known to specifically target Microsoft files?
Macro Virus
Polymorphic Virus
Stealth Virus
Cavity Virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Kali Linux, which file contains the encrypted passwords?
hosts
sam
shadow
networks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the default port number used by MySQL?
3307
3308
3306
3305
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack involves injecting commands into a database?
TTL Attack
Injection Attack
Zero Day Vulnerability
Cryptography Attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves transmitting commands without the user's awareness?
CSRF Attack
XSS Attack
Buffer Overflow
SQL Injection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which nmap command is used for a ping scan?
nmap -sn
nmap -sU
nmap -sX
nmap -sS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is a network vulnerability scanner?
Wireshark
Nmap
Acunetix
Nessus
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
NMAP and ZENMAP Simplified

Interactive video
•
University
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Using Nmap Scripts - 1

Interactive video
•
University
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Exploiting Apache Tomcat with Metasploit

Interactive video
•
University
6 questions
CompTIA Security+ Certification SY0-601: The Total Course - OWASP ZAP Web App Scan Lab

Interactive video
•
University
8 questions
Bug Bounty Program Certification 13.6: Certification Exam Practice Questions – Part 5

Interactive video
•
University
8 questions
CompTIA Security+ Certification SY0-601: The Total Course - Web Application Security

Interactive video
•
University
8 questions
Describe cyber attacks that could affect a computer system or network : Creating Reverse Shell with Metasploit

Interactive video
•
University
8 questions
Bug Bounty Program Certification 8.3: Find Bug and Hack Database of a Website Using Windows Tools

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University