Post-test Quizz RTBT

Post-test Quizz RTBT

Professional Development

20 Qs

quiz-placeholder

Similar activities

Understanding HTML

Understanding HTML

Professional Development

20 Qs

Time Machine

Time Machine

Professional Development

16 Qs

React Redux

React Redux

Professional Development

20 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

CDAC - DOS and Trojan Quiz

CDAC - DOS and Trojan Quiz

Professional Development

15 Qs

Cryptography Quiz

Cryptography Quiz

Professional Development

20 Qs

SOC Analyst

SOC Analyst

Professional Development

25 Qs

Linux_day_2

Linux_day_2

Professional Development

22 Qs

Post-test Quizz RTBT

Post-test Quizz RTBT

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

pentest satu

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the reconnaissance phase in penetration testing?

Run automated exploits

Plant webshells

Gather target information

Create final reports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive reconnaissance?

Performing a DNS zone transfer

Running a port scan with Nmap

Viewing the LinkedIn profile of target staff

Performing brute force login SSH

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common tools used for active reconnaissance are...

Maltego

TheHarvester

Nmap

Netcat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a webshell in the context of pentesting?

Shell script for backup

Script used for remote access via web server

Tools for SQL injection

Metasploit payload specific to Linux

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file extension is commonly used for webshells on PHP servers?

.exe

.html

.php

.txt

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes Red Team from traditional pentesting?

Red Team always uses Metasploit

Red Team is full scope and resembles a real attacker

Red Team does not need a report

Red Team focuses only on one system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a reverse shell?

Accessing shell from client to server

Running exploits from the server

Opening a connection from target to attacker

Finding security vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?