
Hacking
Authored by Nonu goyal
Science
12th Grade - University
Used 69+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is known as cracker?
Hacker
Cryptologist
Developer
Software engineer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For bypassing the windows password, which software has to be Bypass....
Bootloader
OS
Boot menu
Monitor
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. What is the attack called “evil twin”?
Rogue access point
ARP poisoning
Session hijacking
MAC spoofing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the forms of password cracking techniques?
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is the primary goal of an Ethical Hacker ?
Avoiding detection
Testing security controls
Resolving security vulnerabilities
Determining return on investment for security measures
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the first phase of hacking?
Maintaining access
Gaining access
Reconnaissance
Scanning
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Full form of MAC?
Media address control
Media access control
Medium accessed control
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?