Hackers and NetSec

Hackers and NetSec

Professional Development

10 Qs

quiz-placeholder

Similar activities

Brain Networks Trivia

Brain Networks Trivia

12th Grade - Professional Development

7 Qs

PowerLink Quiz

PowerLink Quiz

Professional Development

10 Qs

PKP Pemahaman Fundamental Keamanan Digital Personal

PKP Pemahaman Fundamental Keamanan Digital Personal

Professional Development

10 Qs

Net+ 01 / 02 Review

Net+ 01 / 02 Review

University - Professional Development

11 Qs

Cuestionario Ciberseguridad 1 - ¿Qué es?

Cuestionario Ciberseguridad 1 - ¿Qué es?

Professional Development

10 Qs

Machine Learning Overview

Machine Learning Overview

Professional Development

11 Qs

SFD2023-Week 5

SFD2023-Week 5

Professional Development

12 Qs

IT Support Quizz

IT Support Quizz

University - Professional Development

12 Qs

Hackers and NetSec

Hackers and NetSec

Assessment

Quiz

Science

Professional Development

Hard

Created by

Hisquare Group

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Hackers who work for goveent secret service would be regarded as

Green hat hackers

Black hat hackers

Grey hat hackers

Red hat hackers

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Greg was playing around in a bank and found out their wifi system has a vulnerability. He decided to do the honourable thing by informing thw bank of his findings. Which type of hacker is Greg?

Green hat

Black hat

Grey hat

White hat

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following only logs strange patterns, activities or behaviours on a network?

Firewall

IPS

IDS

Wireshark

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A firewall which blocks traffic based on whether it is UDP or TCP traffic is working on which layer of the OSI model?

Session

Network

Data link

Transport

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A firewall which blocks traffic based on Mac address filtering is working on which layer of the OSI model?

Session

Network

Data link

Transport

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Blue hat hackers are hackers who

Work to promote a passionate cause or idea

Work to test and secure apps in development

Have attained high reputation among their peers

Do both good and evil based on situation

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

An attack in which the attacker finds a way to modify his ip address to match another person's ip address so as to fool a system is regarded as

Forking

Spoofing

Mapping

DNS Hijacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?