
Unit 2 - Objective Questions
Authored by vijeta songire
Other
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Footprinting mainly refers to:
Finding usernames and passwords
Collecting information about a target system
Exploiting system vulnerabilities
Installing backdoors
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is an example of passive footprinting?
Using Nmap scan
Ping sweep
Checking WHOIS records
Port scanning
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Google Dorking is primarily used for:
Encrypting passwords
Searching hidden or sensitive information online
Blocking malware websites
Scanning open ports
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of these is a valid Google Dork operator?
run:
intitle:
-exec:
chmod:
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The process of identifying which hosts are active on a network is called:
Privilege escalation
Host discovery
Banner grabbing
Dictionary attack
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which tool is commonly used for identifying live hosts?
Telnet
Nmap
John the Ripper
Hydra
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
In port scanning, a TCP connect scan:
Skips the handshake process
completes the full three-way handshake
Sends UDP packets only
Hides scanning from firewalls
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?