Post-test Quizz RTBT

Post-test Quizz RTBT

Professional Development

20 Qs

quiz-placeholder

Similar activities

Network Switch and VLAN Quiz

Network Switch and VLAN Quiz

Professional Development

21 Qs

Exploring Digital Forensics

Exploring Digital Forensics

Professional Development

20 Qs

Search Skills Quiz

Search Skills Quiz

Professional Development

15 Qs

Network and Security Quiz

Network and Security Quiz

Professional Development

25 Qs

Networking Devices and Protocols Quiz

Networking Devices and Protocols Quiz

Professional Development

20 Qs

Exam Prep 2

Exam Prep 2

Professional Development

20 Qs

Structured Cabling and Networking Quiz

Structured Cabling and Networking Quiz

Professional Development

20 Qs

ALTSCHOOL QUIZ 13/9/25

ALTSCHOOL QUIZ 13/9/25

Professional Development

25 Qs

Post-test Quizz RTBT

Post-test Quizz RTBT

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

pentest satu

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the reconnaissance phase in penetration testing?

Run automated exploits

Plant webshells

Gather target information

Create final reports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive reconnaissance?

Performing a DNS zone transfer

Running a port scan with Nmap

Viewing the LinkedIn profile of target staff

Performing brute force login SSH

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common tools used for active reconnaissance are...

Maltego

TheHarvester

Nmap

Netcat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a webshell in the context of pentesting?

Shell script for backup

Script used for remote access via web server

Tools for SQL injection

Metasploit payload specific to Linux

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file extension is commonly used for webshells on PHP servers?

.exe

.html

.php

.txt

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes Red Team from traditional pentesting?

Red Team always uses Metasploit

Red Team is full scope and resembles a real attacker

Red Team does not need a report

Red Team focuses only on one system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a reverse shell?

Accessing shell from client to server

Running exploits from the server

Opening a connection from target to attacker

Finding security vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?