CEH Quiz

CEH Quiz

University

31 Qs

quiz-placeholder

Similar activities

Securing Your System: Protecting Your Digital Data and Devices

Securing Your System: Protecting Your Digital Data and Devices

University

30 Qs

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

27 Qs

Computer Security & Privacy

Computer Security & Privacy

University

34 Qs

Data Security Quiz

Data Security Quiz

8th Grade - University

30 Qs

IT Essentials Certification Checkpoint Exam

IT Essentials Certification Checkpoint Exam

University

30 Qs

105P2 Module 3, 4, & 5 Review

105P2 Module 3, 4, & 5 Review

10th Grade - Professional Development

32 Qs

TestOut Quiz CMT+ P/Q

TestOut Quiz CMT+ P/Q

11th Grade - University

30 Qs

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

27 Qs

CEH Quiz

CEH Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Bột Cục

Used 1+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of footprinting in ethical hacking?

To gain unauthorized access to the target system

To install malware on the target system

To gather information about a target system or network

To improve the security of the target system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name two techniques used in footprinting.

Intrusive footprinting and non-intrusive footprinting

Passive footprinting and active footprinting

Stealthy footprinting and loud footprinting

Passive footprinting and aggressive footprinting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is port scanning in the context of ethical hacking?

A type of virus used to gain access to a system

A technique used to discover open ports and potential vulnerabilities on a target system.

A method for securing a network from unauthorized access

A process for encrypting data on a target system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between active and passive enumeration.

Active enumeration involves using a passive approach to gather information.

Active enumeration involves directly interacting with the target system to gather information.

Active enumeration involves only observing the target system without any interaction.

Passive enumeration involves directly interacting with the target system to gather information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the significance of system hacking in the context of cybersecurity?

It improves system performance

It enhances data encryption

It reduces the risk of cyber attacks

It can lead to unauthorized access and data breaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name two common methods used for system hacking.

Firewall bypassing and malware installation

Password cracking and social engineering

Phishing and denial of service attacks

Brute force attacks and SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering and how is it used in hacking?

Social engineering is a type of software used in hacking to gain unauthorized access

Social engineering is a form of physical security used in hacking to break into buildings

Social engineering is the manipulation of individuals to obtain confidential information. It is used in hacking to trick people into revealing passwords or other sensitive data.

Social engineering is a method of encryption used in hacking to protect sensitive data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?