Ethical Hacking Practice Quiz

Ethical Hacking Practice Quiz

University

20 Qs

quiz-placeholder

Similar activities

Practice Quiz

Practice Quiz

University

15 Qs

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

CSE105 Quiz 02

CSE105 Quiz 02

University

15 Qs

Security

Security

University - Professional Development

20 Qs

Port Numbers

Port Numbers

University

18 Qs

Chapter 6 - Unix II

Chapter 6 - Unix II

University

15 Qs

Practice Quiz-1

Practice Quiz-1

University

20 Qs

18) 212.2 Managing FTP servers

18) 212.2 Managing FTP servers

University

15 Qs

Ethical Hacking Practice Quiz

Ethical Hacking Practice Quiz

Assessment

Quiz

Computers

University

Hard

Created by

undefined undefined

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the -A option in Nmap do?

Scans only UDP ports

Aggressive scan: detects OS, version, and runs scripts

Enables ARP scan

Avoids detection by IDS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to discover hidden directories on a web server?

Nmap

SQLmap

DIRB

Burp Suite

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default shell payload used in Metasploit for reverse connections?

windows/reverse_http

shell_bind_tcp

windows/meterpreter/reverse_tcp

meterpreter_bind_tcp

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive information gathering?

Scanning with Nmap

Sending a phishing email

Searching WHOIS records

Running DIRB

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SQL Injection (SQLi) allow an attacker to do?

Perform DoS attacks

Inject HTML into the site

Modify or retrieve database contents

Execute JavaScript in browser

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the command set RHOST in Metasploit?

To set the attacker's IP address

To load a payload

To specify the target machine's IP

To list active sessions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of shell allows the attacker to connect to a victims open port?

Reverse Shell

Persistent Shell

Bind Shell

Meterpreter Shell

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?