Post-test Quizz RTBT

Post-test Quizz RTBT

Professional Development

20 Qs

quiz-placeholder

Similar activities

Drilling Quiz AEM

Drilling Quiz AEM

Professional Development

15 Qs

svsvs

svsvs

Professional Development

20 Qs

HyQuizz_Mùa 3_Day 1

HyQuizz_Mùa 3_Day 1

Professional Development

15 Qs

General Knowledge Quiz #2

General Knowledge Quiz #2

Professional Development

25 Qs

Computer 101

Computer 101

Professional Development

20 Qs

Web Programming Essentials

Web Programming Essentials

Professional Development

15 Qs

FOS Quiz 1

FOS Quiz 1

Professional Development

15 Qs

Computer Hardware Quiz

Computer Hardware Quiz

Professional Development

20 Qs

Post-test Quizz RTBT

Post-test Quizz RTBT

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

pentest satu

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the reconnaissance phase in penetration testing?

Run automated exploits

Plant webshells

Gather target information

Create final reports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive reconnaissance?

Performing a DNS zone transfer

Running a port scan with Nmap

Viewing the LinkedIn profile of target staff

Performing brute force login SSH

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common tools used for active reconnaissance are...

Maltego

TheHarvester

Nmap

Netcat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a webshell in the context of pentesting?

Shell script for backup

Script used for remote access via web server

Tools for SQL injection

Metasploit payload specific to Linux

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file extension is commonly used for webshells on PHP servers?

.exe

.html

.php

.txt

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes Red Team from traditional pentesting?

Red Team always uses Metasploit

Red Team is full scope and resembles a real attacker

Red Team does not need a report

Red Team focuses only on one system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a reverse shell?

Accessing shell from client to server

Running exploits from the server

Opening a connection from target to attacker

Finding security vulnerabilities

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?