Ethical Hacking Practice Quiz

Ethical Hacking Practice Quiz

University

20 Qs

quiz-placeholder

Similar activities

Quiz on Misinformation and Bias

Quiz on Misinformation and Bias

10th Grade - University

18 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

ระบบปฏิบัติการ ชุดที่ 1

ระบบปฏิบัติการ ชุดที่ 1

University

15 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

DWDM Unit1 Quiz

DWDM Unit1 Quiz

University

21 Qs

COA_QUIZ_UNIT I

COA_QUIZ_UNIT I

University

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Algo Quiz

Algo Quiz

University

16 Qs

Ethical Hacking Practice Quiz

Ethical Hacking Practice Quiz

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

undefined undefined

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the -A option in Nmap do?

Scans only UDP ports

Aggressive scan: detects OS, version, and runs scripts

Enables ARP scan

Avoids detection by IDS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to discover hidden directories on a web server?

Nmap

SQLmap

DIRB

Burp Suite

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default shell payload used in Metasploit for reverse connections?

windows/reverse_http

shell_bind_tcp

windows/meterpreter/reverse_tcp

meterpreter_bind_tcp

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive information gathering?

Scanning with Nmap

Sending a phishing email

Searching WHOIS records

Running DIRB

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SQL Injection (SQLi) allow an attacker to do?

Perform DoS attacks

Inject HTML into the site

Modify or retrieve database contents

Execute JavaScript in browser

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the command set RHOST in Metasploit?

To set the attacker's IP address

To load a payload

To specify the target machine's IP

To list active sessions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of shell allows the attacker to connect to a victims open port?

Reverse Shell

Persistent Shell

Bind Shell

Meterpreter Shell

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?