Ethical Hacking - Quiz

Ethical Hacking - Quiz

University

15 Qs

quiz-placeholder

Similar activities

Process modeling

Process modeling

University

10 Qs

 QUIZ  MS Core Java Quiz-3 2023

QUIZ MS Core Java Quiz-3 2023

University

11 Qs

Pengantar Teknologi Informasi 8

Pengantar Teknologi Informasi 8

University

17 Qs

computer Networks

computer Networks

University

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

E-Commerce

E-Commerce

University - Professional Development

16 Qs

DCN5511: Chapter 5 - 7

DCN5511: Chapter 5 - 7

University

15 Qs

YAY! Fridate with ComSSA (Network 101)

YAY! Fridate with ComSSA (Network 101)

University

20 Qs

Ethical Hacking - Quiz

Ethical Hacking - Quiz

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Jenefa Engineering

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker works to improve security by identifying and fixing vulnerabilities with permission?

Black Hat

White Hat

Grey Hat

Hacktivist

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers who break into systems illegally with malicious intent are known as:

Black Hat

White Hat

Grey Hat

Script Kiddie

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of a Grey Hat hacker?

Performing attacks for financial gain

Finding vulnerabilities and reporting them, often without permission

Disrupting services for a social cause

All the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker motivated by social or political causes is known as a

Black Hat

White Hat

Hacktivist

White Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of hacking involves gathering information about a target to plan an attack?

Scanning

Gaining Access

Reconnaissance

Covering Tracks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which phase of hacking does an attacker identify open ports and services on a target system?

Reconnaissance

Scanning

Gaining Access

Maintaining Access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of the "covering tracks" phase?

To gather more information about the target

To remove evidence of the attack

To install malware on the system

To gain further access privileges

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?