Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

quiz-placeholder

Similar activities

Hackers?

Hackers?

University

20 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Basic Network

Basic Network

10th Grade

16 Qs

Cloud Computing

Cloud Computing

7th - 11th Grade

10 Qs

Data Security (G8)

Data Security (G8)

2nd Grade

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

computer security threats

computer security threats

8th Grade

16 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

Assessment

Quiz

Computers

KG - Professional Development

Medium

Created by

Mata Libre

Used 11+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would a hacker use a proxy server?

To create a stronger connection with the target.

To create a ghost server on the network.

To obtain a remote access connection.

To hide malicious activity on the network.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is independent malicious program that need not any host program?

Trap doors

Trojan horse

Worm

Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of hacking performs actual attack on a network or system?

Reconnaissance

Maintaining Access

Scanning

Gaining Access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.

Local networking

Social engineering

Physical entry

Remote networking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a typical characteristic of an ethical hacker?

Excellent knowledge of Windows.

Understands the process of exploiting network vulnerabilities.

Patience, persistence and perseverance.

Has the highest level of security for the organization.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first phase of hacking an IT system is compromise of which foundation of security?

Availability

Confidentiality

Integrity

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.

Cracking

Analysis

Hacktivism

Exploitation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?