Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

quiz-placeholder

Similar activities

IY3D607 - Users and Advanced Enumeration

IY3D607 - Users and Advanced Enumeration

University

20 Qs

QUIZ CEH 3-4

QUIZ CEH 3-4

University

15 Qs

cyber security test

cyber security test

University

22 Qs

Cyber EOP - Network Devices By Mr. B

Cyber EOP - Network Devices By Mr. B

12th Grade - University

18 Qs

Ethical Hacking Practice Quiz

Ethical Hacking Practice Quiz

University

20 Qs

KemJar

KemJar

University

20 Qs

Ethical Hacking

Ethical Hacking

University

15 Qs

FQuiz3 BSIT4C

FQuiz3 BSIT4C

University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Stylianos Karagiannis

Used 10+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default database for WPScan vulnerabilities?

SQLite

Local file system

MySQL

PostgreSQL

Remote WPScan API

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is used for password cracking?

Nessus

John the Ripper

Nmap

Burp Suite

Netdiscover

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is a commonly used tool for network scanning?

Nmap

Burp Suite

Wireshark

Nessus

Metasploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WPScan primarily used for?

Monitoring network traffic

Encrypting data

Scanning network ports

Creating malware

Testing the security of WordPress websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool uses wordlists to guess hidden directories and files on a web server?

John the Ripper

Nikto

Gobuster

Nmap

Metasploit

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which tool is commonly used for discovering vulnerabilities in web applications?

Burp Suite

John the Ripper

Wireshark

Nikto

Nmap

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Tshark/Wireshark primarily used for in ethical hacking?

Password cracking

Exploit development

Network packet analysis

Social engineering

Web application scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?