
Hacking
Authored by Trung Chi
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the use of reverse shell?
Scan services
Gain remote control
Encrypt disks
Block attackers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which system component manages memory?
BIOS
GPU
Operating System
Bootloader
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a secure hashing algorithm?
DES
SHA-256
Base64
ROT13
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which header protects against XSS?
Content-Security-Policy
Server
Accept-Encoding
User-Agent
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is a session hijacking tool?
Splunk
Firesheep
IDA
Bash
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a honeypot?
Encrypt traffic
Speed up routing
Lure attackers
Disable firewalls
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term describes hiding data inside another file?
Encryption
Steganography
Hashing
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?