Foundations of Ethical Hacking

Foundations of Ethical Hacking

University

20 Qs

quiz-placeholder

Similar activities

Temperature Measurement

Temperature Measurement

University

20 Qs

Computer Network

Computer Network

University

20 Qs

GENERAL PACKET RADIO SERVICES (GPRS)

GENERAL PACKET RADIO SERVICES (GPRS)

University

15 Qs

Quiz on Sustainable Development Goals (SDGs)

Quiz on Sustainable Development Goals (SDGs)

University

24 Qs

Cloud Computing Unit 1

Cloud Computing Unit 1

University

20 Qs

Sustainable Food Systems Quiz

Sustainable Food Systems Quiz

University

20 Qs

Cybersecurity Fundamentals Assessment

Cybersecurity Fundamentals Assessment

University

25 Qs

Power Tools: Hazards & Safe Operation

Power Tools: Hazards & Safe Operation

12th Grade - University

16 Qs

Foundations of Ethical Hacking

Foundations of Ethical Hacking

Assessment

Quiz

Engineering

University

Medium

Created by

Vijayakumar Rajarathinam

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the action that might compromise cyber security?

Threat

Attack

Exploit

Vulnerability

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first phase of Hacking?

Installation
Reconnaissance
Exploitation
Covering Tracks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is the oldest phone hacking technique hackers use to make free calls.

Cracking

Phishing

Phreaking

Spamming

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method used to protect against phishing attacks?

Two-factor authentication

Phreaking

Social engineering

Spamming

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Identify the term that describes a weakness in a system that can be exploited by hackers.

Threat

Attack

Vulnerability

Exploit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?

Email

Websites

IP tracer

Web servers

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What phase of ethical hacking is enumeration part of?

 Reconnaissance

Maintaining Access

Gaining Access

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?