Search Header Logo

Hacking

Authored by Trung Chi

Computers

University

Used 1+ times

Hacking
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the use of reverse shell?

Scan services

Gain remote control

Encrypt disks

Block attackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which system component manages memory?

BIOS

GPU

Operating System

Bootloader

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a secure hashing algorithm?

DES

SHA-256

Base64

ROT13

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which header protects against XSS?

Content-Security-Policy

Server

Accept-Encoding

User-Agent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a session hijacking tool?

Splunk

Firesheep

IDA

Bash

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a honeypot?

Encrypt traffic

Speed up routing

Lure attackers

Disable firewalls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes hiding data inside another file?

Encryption

Steganography

Hashing

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?