Hacking Scenarios

Hacking Scenarios

University

12 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

University

10 Qs

Quiz 2

Quiz 2

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Group 3

Group 3

University

14 Qs

Network Architecture

Network Architecture

University

14 Qs

cyber security workshop

cyber security workshop

University

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Hacking

Hacking

University

12 Qs

Hacking Scenarios

Hacking Scenarios

Assessment

Quiz

Computers

University

Hard

Used 348+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following statements best describes a white-hat hacker?
Security professional 
Former black hat
Former gray hat
Malicious hacker

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A security audit performed on the internal network of an organization by the network administration is also known as:
Gray-box testing
Black-box testing
White-box testing
Active testing

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the first phase of hacking?
Attack
Maintaining access
Gaining access
Reconnaissance

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of ethical hack tests access to the physical infrastructure?
Internal network
Remote network
External network
Physical access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
The security, functionality, and ease of use triangle illustrates which concept?
As security increases, functionality and ease of use increase
As security decreases, functionality and ease of use increase
As security decreases, functionality and ease of use decrease
Security does not affect functionality and ease of use

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of hacker represents the highest risk to your network?
Disgruntled employees
Black-hat hackers
Gray-hat hackers
Script kiddies

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Hacking for a cause is called:
Active hacking
Hacktivism
Activism
Black-hat hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?