Search Header Logo

Emerging Trends CO/IF -Ch 6

Authored by Pallavi Nehete

Education

University

Used 3+ times

Emerging Trends CO/IF  -Ch 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tool is used for network testing and port scanning

Netcat

Superscan

Netscan

All of above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not community hacked port number

18

19

20

21

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Banner grabbing is done by using

Telnet

Netcat

A & B

None

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MITM attack stands for

Message in the Mail Attack

Man in the middle attack

Malware in the middle attack

Message in the middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

………...is a programe that acts as an interface between software & Hardware

Service

Network

OS

None

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Weakness of a security program is called as

Vulnerability

Risk

Assets

None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TFTP Stand for

Trivial file transfer procedure

Trival File Transfer Protocol

Trival File Transfer Process

Trival File Transfer Product

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?