Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

quiz-placeholder

Similar activities

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

Cybersecurity & Ethical Hacking Quiz

Cybersecurity & Ethical Hacking Quiz

University

15 Qs

Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

University

20 Qs

Computer viruses!

Computer viruses!

6th Grade - University

20 Qs

Module1_L1&2 Exit Quiz

Module1_L1&2 Exit Quiz

10th Grade - University

20 Qs

Communication and networks

Communication and networks

University

20 Qs

Exploring Security Testing Techniques

Exploring Security Testing Techniques

University

20 Qs

ENSA Module Quiz 12 – Network Troubleshooting

ENSA Module Quiz 12 – Network Troubleshooting

University

23 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Stylianos Karagiannis

Used 10+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default database for WPScan vulnerabilities?

SQLite

Local file system

MySQL

PostgreSQL

Remote WPScan API

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools is used for password cracking?

Nessus

John the Ripper

Nmap

Burp Suite

Netdiscover

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is a commonly used tool for network scanning?

Nmap

Burp Suite

Wireshark

Nessus

Metasploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WPScan primarily used for?

Monitoring network traffic

Encrypting data

Scanning network ports

Creating malware

Testing the security of WordPress websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool uses wordlists to guess hidden directories and files on a web server?

John the Ripper

Nikto

Gobuster

Nmap

Metasploit

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which tool is commonly used for discovering vulnerabilities in web applications?

Burp Suite

John the Ripper

Wireshark

Nikto

Nmap

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Tshark/Wireshark primarily used for in ethical hacking?

Password cracking

Exploit development

Network packet analysis

Social engineering

Web application scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?