
Offensive Security
Authored by Ida B
Engineering
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which will not come under offensive security?
Intrusion Detection
Social Engineering
Red Teaming
Pen Testing
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
__________ is protecting computer systems and networks from attack.
Neither Offensive nor Defensive Security
Offensive Security
Both Offensive & Defensive Security
Defensive Security
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Hackers who seek to take personal revenge.
Black Hat Hackers
Red Hat Hackers
Blue Hat Hackers
Grey Hat Hackers
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Pwd means _______
Present World Directory
Present Working Directory
Present Working Dictionary
Past Working Directory
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Touch command is used to ________.
create a file
edit the file
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
mv command is used to ______ the file.
rename
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
___________ command is used to change the file permissions.
cat
cp
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?