Post-test Quizz RTBT

Post-test Quizz RTBT

Professional Development

20 Qs

quiz-placeholder

Similar activities

Data Analysis and Visualization

Data Analysis and Visualization

Professional Development

15 Qs

Generative AI Worksheet

Generative AI Worksheet

Professional Development

20 Qs

Q1: DATABASE SYSTEM

Q1: DATABASE SYSTEM

Professional Development

18 Qs

Cybersecurity Scenarios and Solutions

Cybersecurity Scenarios and Solutions

Professional Development

20 Qs

Redundancy Strategies

Redundancy Strategies

Professional Development

16 Qs

Dia 2 - Riesgos y Monitoreo

Dia 2 - Riesgos y Monitoreo

Professional Development

20 Qs

Cyber Security livello 2

Cyber Security livello 2

Professional Development

20 Qs

Post-test Quizz RTBT

Post-test Quizz RTBT

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Medium

Created by

pentest satu

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the reconnaissance phase in penetration testing?

Run automated exploits

Plant webshells

Gather target information

Create final reports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of passive reconnaissance?

Performing a DNS zone transfer

Running a port scan with Nmap

Viewing the LinkedIn profile of target staff

Performing brute force login SSH

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Common tools used for active reconnaissance are...

Maltego

TheHarvester

Nmap

Netcat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a webshell in the context of pentesting?

Shell script for backup

Script used for remote access via web server

Tools for SQL injection

Metasploit payload specific to Linux

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file extension is commonly used for webshells on PHP servers?

.exe

.html

.php

.txt

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes Red Team from traditional pentesting?

Red Team always uses Metasploit

Red Team is full scope and resembles a real attacker

Red Team does not need a report

Red Team focuses only on one system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a reverse shell?

Accessing shell from client to server

Running exploits from the server

Opening a connection from target to attacker

Finding security vulnerabilities

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?