Search Header Logo

Foundations of Ethical Hacking

Authored by Vijayakumar Rajarathinam

Engineering

University

Used 3+ times

Foundations of Ethical Hacking
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the action that might compromise cyber security?

Threat

Attack

Exploit

Vulnerability

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first phase of Hacking?

Installation
Reconnaissance
Exploitation
Covering Tracks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is the oldest phone hacking technique hackers use to make free calls.

Cracking

Phishing

Phreaking

Spamming

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method used to protect against phishing attacks?

Two-factor authentication

Phreaking

Social engineering

Spamming

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Identify the term that describes a weakness in a system that can be exploited by hackers.

Threat

Attack

Vulnerability

Exploit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?

Email

Websites

IP tracer

Web servers

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What phase of ethical hacking is enumeration part of?

 Reconnaissance

Maintaining Access

Gaining Access

Scanning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?