
BIG presentation
Authored by Test Python
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who uses TOR?
Journalists
Zhaklina
Criminals
All of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Tor?
A VPN
Proxy
Browser
Linux Distribution
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you access deep web?
Tales
Whonix
Tor for mobile
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a type of hacker?
Green Hat
Grey Hat
White Hat
Black Hat
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the job of an Ethical Hacker
a) Identify weaknesses
b) find countermeasures
that protect the weaknesses
a and b
None of the them
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is PEAS available in both Linux and Windows?
Yes
No
I do not know
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a Linux Privilege Escalation technique?
Capabilities
NFS
Access Token Manipulation
Cron Jobs
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?