
cyber security test
Authored by 2111CS040096 KUMAR
Computers
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
which tool is used to grab emails of a domain?
hunter.io
subdomain.com
nmap
cruiz
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Is blind injection come under XSS
TRUE
FALSE
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What rules make an operating system to verify and make strong from incoming packets?
inbound rules
out bound rules
connection security rules
paradigm rules
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
give command to run feroxbuster using wordlist
url:www.hello.com
wordlist: pink.text
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which tag is used to gain cookies from a server?
<script>alert(document.cookie);</script>
<script>alert("document.cookie");</script>
<script>alert(cookie);</script>
<script>alert(document.cookie;) </script>
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
give a google dork to find directory transversal for configuration directory which contains user credentials
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
There is a tab VOIP in packet sniffing tool what does it do?
used to record calls
used to track the location
used to listen calls
used to track ip address
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?