BIG presentation

BIG presentation

University

8 Qs

quiz-placeholder

Similar activities

Linux Essentials Test Prep

Linux Essentials Test Prep

University

10 Qs

Linux Essentials

Linux Essentials

University

10 Qs

Linux LPI 010-160

Linux LPI 010-160

University

10 Qs

ComputerSecurityQ1Review:History

ComputerSecurityQ1Review:History

10th Grade - University

12 Qs

Operating Systems

Operating Systems

9th Grade - Professional Development

10 Qs

Computer Fundamentals

Computer Fundamentals

University

10 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

BIG presentation

BIG presentation

Assessment

Quiz

Computers

University

Medium

Created by

Test Python

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Who uses TOR?

Journalists

Zhaklina

Criminals

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is Tor?

A VPN

Proxy

Browser

Linux Distribution

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How can you access deep web?

Tales

Whonix

Tor for mobile

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is not a type of hacker?

Green Hat

Grey Hat

White Hat

Black Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the job of an Ethical Hacker

a) Identify weaknesses

b) find countermeasures

that protect the weaknesses

a and b

None of the them

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is PEAS available in both Linux and Windows?

Yes

No

I do not know

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a Linux Privilege Escalation technique?

Capabilities

NFS

Access Token Manipulation

Cron Jobs

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of Privilege escalation exist?

1

2

3

7