Ethical Hacking

Ethical Hacking

Professional Development

50 Qs

quiz-placeholder

Similar activities

IT Security ICDL

IT Security ICDL

Professional Development

50 Qs

Fundamental of Computers

Fundamental of Computers

Professional Development

50 Qs

May test sscsa

May test sscsa

Professional Development

50 Qs

Personal Computers and Networking

Personal Computers and Networking

Professional Development

50 Qs

DGI- QUIZ

DGI- QUIZ

Professional Development

50 Qs

CS-BSCE 2C EXAM REVIEWER

CS-BSCE 2C EXAM REVIEWER

KG - Professional Development

54 Qs

Тема го тема 54-106

Тема го тема 54-106

Professional Development

54 Qs

Computer Hardware and Software - Networking

Computer Hardware and Software - Networking

Professional Development

50 Qs

Ethical Hacking

Ethical Hacking

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Avinash Borse

Used 16+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maintaining access

Gaining access

Reconnaissance

Scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many phases are there in hacking?

4

5

7

6

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is the information gathering phase in ethical hacking from the target user.

Reconnaissance

Scanning

Gaining access

Maintaining access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a reconnaissance tool or technique for information gathering?

NMAP

Hping

whois lookup

Nexpose

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are ______ subtypes of reconnaissance.

2

3

4

5

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of active reconnaissance?

Searching public records

Telephone calls as a help desk or fake customer care person

Looking for the target’s details in the database

Searching the target’s details in paper files

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.

Fingerprinting

3D printing

Footprinting

Data printing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?