Search Header Logo

BIG presentation

Authored by Test Python

Computers

University

Used 3+ times

BIG presentation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Who uses TOR?

Journalists

Zhaklina

Criminals

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is Tor?

A VPN

Proxy

Browser

Linux Distribution

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How can you access deep web?

Tales

Whonix

Tor for mobile

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is not a type of hacker?

Green Hat

Grey Hat

White Hat

Black Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the job of an Ethical Hacker

a) Identify weaknesses

b) find countermeasures

that protect the weaknesses

a and b

None of the them

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is PEAS available in both Linux and Windows?

Yes

No

I do not know

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a Linux Privilege Escalation technique?

Capabilities

NFS

Access Token Manipulation

Cron Jobs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers