Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

quiz-placeholder

Similar activities

IP ADDRESS

IP ADDRESS

University

20 Qs

Network Quiz 1

Network Quiz 1

University

20 Qs

Komponen Jaringan & Pengkabelan

Komponen Jaringan & Pengkabelan

University

15 Qs

Quiz Webinar GNS3

Quiz Webinar GNS3

10th Grade - University

13 Qs

Webinar Quiz

Webinar Quiz

University

13 Qs

CCI Summit Net.Conf Webinar Quiz

CCI Summit Net.Conf Webinar Quiz

University

15 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Chapter 4: ROM/RAM

Chapter 4: ROM/RAM

9th Grade - Professional Development

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Stylianos Karagiannis

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default database for WPScan vulnerabilities?

SQLite

Local file system

MySQL

PostgreSQL

Remote WPScan API

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is used for password cracking?

Nessus

John the Ripper

Nmap

Burp Suite

Netdiscover

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is a commonly used tool for network scanning?

Nmap

Burp Suite

Wireshark

Nessus

Metasploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WPScan primarily used for?

Monitoring network traffic

Encrypting data

Scanning network ports

Creating malware

Testing the security of WordPress websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool uses wordlists to guess hidden directories and files on a web server?

John the Ripper

Nikto

Gobuster

Nmap

Metasploit

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which tool is commonly used for discovering vulnerabilities in web applications?

Burp Suite

John the Ripper

Wireshark

Nikto

Nmap

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Tshark/Wireshark primarily used for in ethical hacking?

Password cracking

Exploit development

Network packet analysis

Social engineering

Web application scanning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?