Search Header Logo

CEH Quiz

Authored by Bột Cục

Computers

University

Used 2+ times

CEH Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of footprinting in ethical hacking?

To gain unauthorized access to the target system

To install malware on the target system

To gather information about a target system or network

To improve the security of the target system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name two techniques used in footprinting.

Intrusive footprinting and non-intrusive footprinting

Passive footprinting and active footprinting

Stealthy footprinting and loud footprinting

Passive footprinting and aggressive footprinting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is port scanning in the context of ethical hacking?

A type of virus used to gain access to a system

A technique used to discover open ports and potential vulnerabilities on a target system.

A method for securing a network from unauthorized access

A process for encrypting data on a target system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between active and passive enumeration.

Active enumeration involves using a passive approach to gather information.

Active enumeration involves directly interacting with the target system to gather information.

Active enumeration involves only observing the target system without any interaction.

Passive enumeration involves directly interacting with the target system to gather information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the significance of system hacking in the context of cybersecurity?

It improves system performance

It enhances data encryption

It reduces the risk of cyber attacks

It can lead to unauthorized access and data breaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name two common methods used for system hacking.

Firewall bypassing and malware installation

Password cracking and social engineering

Phishing and denial of service attacks

Brute force attacks and SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering and how is it used in hacking?

Social engineering is a type of software used in hacking to gain unauthorized access

Social engineering is a form of physical security used in hacking to break into buildings

Social engineering is the manipulation of individuals to obtain confidential information. It is used in hacking to trick people into revealing passwords or other sensitive data.

Social engineering is a method of encryption used in hacking to protect sensitive data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?