Foundations of Ethical Hacking

Foundations of Ethical Hacking

University

20 Qs

quiz-placeholder

Similar activities

OPM_Quiz1

OPM_Quiz1

University

20 Qs

1.4.1 - From High School to College: Guide for Future Engineers

1.4.1 - From High School to College: Guide for Future Engineers

10th Grade - University

20 Qs

Exploring the 8086 Microprocessor

Exploring the 8086 Microprocessor

University

25 Qs

Lean Manufacturing and Waste Reduction Quiz

Lean Manufacturing and Waste Reduction Quiz

12th Grade - University

15 Qs

Computer Networks CT-3

Computer Networks CT-3

University

20 Qs

CIBERSEGURIDAD TEMA 2

CIBERSEGURIDAD TEMA 2

7th Grade - University

20 Qs

AWS WORKSHOP QUIZ

AWS WORKSHOP QUIZ

University

15 Qs

Computer Networks CT-2

Computer Networks CT-2

University

20 Qs

Foundations of Ethical Hacking

Foundations of Ethical Hacking

Assessment

Quiz

Engineering

University

Medium

Created by

Vijayakumar Rajarathinam

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which one of the action that might compromise cyber security?

Threat

Attack

Exploit

Vulnerability

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first phase of Hacking?

Installation
Reconnaissance
Exploitation
Covering Tracks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is the oldest phone hacking technique hackers use to make free calls.

Cracking

Phishing

Phreaking

Spamming

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method used to protect against phishing attacks?

Two-factor authentication

Phreaking

Social engineering

Spamming

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Identify the term that describes a weakness in a system that can be exploited by hackers.

Threat

Attack

Vulnerability

Exploit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?

Email

Websites

IP tracer

Web servers

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What phase of ethical hacking is enumeration part of?

 Reconnaissance

Maintaining Access

Gaining Access

Scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?