
Emerging Trends CO/IF -Ch 6
Authored by Pallavi Nehete
Education
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following tool is used for network testing and port scanning
Netcat
Superscan
Netscan
All of above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not community hacked port number
18
19
20
21
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Banner grabbing is done by using
Telnet
Netcat
A & B
None
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
MITM attack stands for
Message in the Mail Attack
Man in the middle attack
Malware in the middle attack
Message in the middle attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
………...is a programe that acts as an interface between software & Hardware
Service
Network
OS
None
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Weakness of a security program is called as
Vulnerability
Risk
Assets
None
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TFTP Stand for
Trivial file transfer procedure
Trival File Transfer Protocol
Trival File Transfer Process
Trival File Transfer Product
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?