Phases of Hacking

Phases of Hacking

1st - 3rd Grade

12 Qs

quiz-placeholder

Similar activities

Animal Tracks

Animal Tracks

KG - Professional Development

13 Qs

The Cat in the Hat

The Cat in the Hat

KG - University

9 Qs

2-Modes of Transport

2-Modes of Transport

1st - 2nd Grade

10 Qs

Christmas Trivia

Christmas Trivia

KG - University

14 Qs

Trick Quiz

Trick Quiz

KG - University

15 Qs

Sticky Knowledge so far...

Sticky Knowledge so far...

2nd Grade

12 Qs

quizz NOTE 9

quizz NOTE 9

1st - 2nd Grade

10 Qs

Clone Wars

Clone Wars

3rd - 10th Grade

14 Qs

Phases of Hacking

Phases of Hacking

Assessment

Quiz

Fun, Specialty

1st - 3rd Grade

Hard

Created by

Mauricio Barboza

Used 103+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the proper order of an Ethical Hacking

Scanning, Maintaining Access, Gaining Access, Planning and Reconnaissance, Covering Tracks, Reporting

Planning and Reconnaissance, Gaining Access, Scanning, Maintaining Access, Covering Tracks, Reporting

Planning and Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks, Reporting

Covering Tracks, Planning and Reconnaissance, Gaining Access, Scanning, Maintaining Access, Reporting

Planning and Reconnaissance, Scanning, Gaining Access, Maintaining Access, Reporting, Covering Tracks,

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The scanning phase is where exploits of the vulnerabilities found are launched

True

False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ethical hackers who work to protect systems and people

Black Hat

White Hat

Grey Hat

Red Hat

Blue Hat

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Amateur hackers who are not qualified. They depend on programs and files to hack and don't bother to learn how they work.

White Hat

Social Media Hacker

Red Hat

Script Kiddie

Green Hat

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Deleting entire logs is the best way to cover your tracks

True

False

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The evidence found in the phases is never delivered to the clients

True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is the phase where the exploits are launched or different techniques are used in order to compromise a team and take control of it?

Gaining Access

Scanning

Maintaining Access

Covering Tracks

Planning and Reconnaissance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?