Ethical Hacking Review Quiz

Ethical Hacking Review Quiz

University

21 Qs

quiz-placeholder

Similar activities

SQL

SQL

University

18 Qs

Information Management - QUIZ

Information Management - QUIZ

University

20 Qs

Quiz [Introduction to SQL ]

Quiz [Introduction to SQL ]

University

20 Qs

NoSQL & MongoDB

NoSQL & MongoDB

University

20 Qs

TALLER BD UNIDAD 5

TALLER BD UNIDAD 5

University

20 Qs

NoSQL Databases Quiz

NoSQL Databases Quiz

University

21 Qs

BASIS DATA -  Modul 05

BASIS DATA - Modul 05

University

20 Qs

MB-6

MB-6

University

20 Qs

Ethical Hacking Review Quiz

Ethical Hacking Review Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jason Clifford

Used 2+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which establishment needs to be HIPAA certified?

Hospitals

Shops

Credit card companies

Banks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why may cookies be stolen via XSS?

To steal another user's session.

To inject malware to the client.

To deprive the server of data.

To steal another user's ID.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is true regarding an SFX attack? Choose all correct answers.

SFX are self-extracting executables.

SFX can be used to deceive a victim into running background executables and scripts.

SFX icons cannot be changed.

All files extracted via SFX are visible.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about Hashcat?

Hashcat can use the GPU as the processing unit for brute-force attacks.

Hashcat is considered outdated and old.

Hashcat can only perform brute-force using rainbow tables.

Hashcat can perform fast online brute-force attacks.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Talos do?

Gathers global information about cyber attacks

Alerts the police if it detects suspicious network behavior

Detects all illegal traffic in an internal network

Collects food recipes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the BEST way to mitigate unwanted pre-boot access to a Windows machine?

Full disk encryption

Table lock

BIOS password

Implementing password complexity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which SQL Injection attack is the easiest to perform?

User SQL Injection

Blind SQL Injection

Time-based blind SQL Injection

Error-based SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?