Ethical Hacking

Ethical Hacking

University

20 Qs

quiz-placeholder

Similar activities

MIDTERM EXAM - IT APP

MIDTERM EXAM - IT APP

University

17 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

LIVE QUIZ - SDG 4, 5 AND 6

LIVE QUIZ - SDG 4, 5 AND 6

University

15 Qs

FNSINC612 Practice 3

FNSINC612 Practice 3

University

15 Qs

EC8071_CR_MODELEXAM-IV (08.12.2020)_PART-B

EC8071_CR_MODELEXAM-IV (08.12.2020)_PART-B

University

15 Qs

LSM - 2

LSM - 2

University

16 Qs

21CSC305P - Machnine Learning - Quiz

21CSC305P - Machnine Learning - Quiz

University

15 Qs

Research methodology

Research methodology

University

20 Qs

Ethical Hacking

Ethical Hacking

Assessment

Quiz

Other, Computers

University

Practice Problem

Medium

Created by

surya B

Used 401+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maintaining access

Gaining access

Reconnaissance

Scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many phases are there in hacking?

4

5

7

6

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the information gathering phase in ethical hacking from the target user.

Reconnaissance

Scanning

Gaining access

Maintaining access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a reconnaissance tool or technique for information gathering?

NMAP

Hping

whois lookup

Nexpose

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are ______ subtypes of reconnaissance.

2

3

4

5

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of active reconnaissance?

Searching public records

Telephone calls as a help desk or fake customer care person

Looking for the target’s details in the database

Searching the target’s details in paper files

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.

Fingerprinting

3D printing

Footprinting

Data printing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?