Phases of Hacking

Phases of Hacking

1st - 3rd Grade

12 Qs

quiz-placeholder

Similar activities

Kennst du deine Stadt Wörth am Rhein?

Kennst du deine Stadt Wörth am Rhein?

KG - Professional Development

15 Qs

.

.

1st Grade - Professional Development

10 Qs

 FUN NAMES OF HACKERS

FUN NAMES OF HACKERS

3rd - 10th Grade

11 Qs

fast food restaurants

fast food restaurants

KG - Professional Development

14 Qs

The worst day of my life ever

The worst day of my life ever

KG - 5th Grade

12 Qs

dress up/clothes quiz : easy

dress up/clothes quiz : easy

2nd - 3rd Grade

10 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

Ostern

Ostern

1st - 12th Grade

14 Qs

Phases of Hacking

Phases of Hacking

Assessment

Quiz

Fun, Specialty

1st - 3rd Grade

Practice Problem

Hard

Created by

Mauricio Barboza

Used 103+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the proper order of an Ethical Hacking

Scanning, Maintaining Access, Gaining Access, Planning and Reconnaissance, Covering Tracks, Reporting

Planning and Reconnaissance, Gaining Access, Scanning, Maintaining Access, Covering Tracks, Reporting

Planning and Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks, Reporting

Covering Tracks, Planning and Reconnaissance, Gaining Access, Scanning, Maintaining Access, Reporting

Planning and Reconnaissance, Scanning, Gaining Access, Maintaining Access, Reporting, Covering Tracks,

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The scanning phase is where exploits of the vulnerabilities found are launched

True

False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ethical hackers who work to protect systems and people

Black Hat

White Hat

Grey Hat

Red Hat

Blue Hat

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Amateur hackers who are not qualified. They depend on programs and files to hack and don't bother to learn how they work.

White Hat

Social Media Hacker

Red Hat

Script Kiddie

Green Hat

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Deleting entire logs is the best way to cover your tracks

True

False

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The evidence found in the phases is never delivered to the clients

True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is the phase where the exploits are launched or different techniques are used in order to compromise a team and take control of it?

Gaining Access

Scanning

Maintaining Access

Covering Tracks

Planning and Reconnaissance

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?