
Foundations of Ethical Hacking
Authored by Vijayakumar Rajarathinam
Engineering
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which one of the action that might compromise cyber security?
Threat
Attack
Exploit
Vulnerability
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the first phase of Hacking?
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
This is the oldest phone hacking technique hackers use to make free calls.
Cracking
Phishing
Phreaking
Spamming
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a common method used to protect against phishing attacks?
Two-factor authentication
Phreaking
Social engineering
Spamming
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Identify the term that describes a weakness in a system that can be exploited by hackers.
Threat
Attack
Vulnerability
Exploit
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?
Websites
IP tracer
Web servers
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What phase of ethical hacking is enumeration part of?
Reconnaissance
Maintaining Access
Gaining Access
Scanning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?