ETHICAL HACKING CT-3 QUIZ

ETHICAL HACKING CT-3 QUIZ

University

20 Qs

quiz-placeholder

Similar activities

Properties of Materials

Properties of Materials

University

15 Qs

TECH WHIZ

TECH WHIZ

University

15 Qs

Quizotronics Quiz

Quizotronics Quiz

University

20 Qs

Logo Thon Quiz Competition

Logo Thon Quiz Competition

University

20 Qs

Web Development with MERN

Web Development with MERN

University

20 Qs

Sensores en aplicaciones prácticas en el ámbito naval

Sensores en aplicaciones prácticas en el ámbito naval

University

20 Qs

Next Generation OS

Next Generation OS

University

15 Qs

SE CT3 QUIZ

SE CT3 QUIZ

University

20 Qs

ETHICAL HACKING CT-3 QUIZ

ETHICAL HACKING CT-3 QUIZ

Assessment

Quiz

Engineering

University

Easy

Created by

Swathi Kadiyala

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What is the first step in the system hacking process?

A. Gaining Access

B. Escalating Privileges

C. Covering Tracks

D. Installing Keyloggers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Which tool is commonly used for brute-force password attacks?

A. Nmap

B. Burp Suite

C. Hydra

D. Nikto

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What does a keylogger do?

A. Encrypts files

B. Captures keystrokes

C. Prevents logins

D. Cracks passwords using rainbow tables

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of attack uses a precomputed table for password cracking?

A. Brute-force attack

B. Dictionary attack

C. Rainbow table attack

D. Keylogging attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which of the following is a commonly used keylogger?

A. Wireshark

B. Ardamax

C. John the Ripper

D. Metasploit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What is the final step in the system hacking lifecycle?

A. Escalating privileges

B. Covering tracks

C. Gaining access

D. Cracking passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which method tries all possible combinations of characters to find the correct password?

A. Hybrid Attack

B. Dictionary Attack

C. Brute Force Attack

D. Keylogging

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?