Search Header Logo

Test 8

Authored by Bùi Tuấn

English

12th Grade

Used 2+ times

Test 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trying to list all the servers on a network is referred to as what?

Vulnerability scanning

Scouting

Enumeration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a popular enumeration tool?

Nmap

MBSA

Cheops

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered the most stealthy port scan?

Nmap

Ping

SYN

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most stealthy way to find out what type of server a website is running?

Use Cain and Abel

Use Nmap

Use www.archive.org

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By attempting some of these techniques used by hackers on your network, you can assess your ...

vulture

vulnerability

vulgar

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This attack is based on passing structured query language commands to a web application and getting the website to execute them. What is this?

Cross-Site Scripting

SQL Script Injection

Hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Relational databases are based on relations between various tables. The structure includes tables, primary and ..., and relations.

private keys

foreign keys

titles

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?