Unit 2 - Objective Questions

Unit 2 - Objective Questions

University

23 Qs

quiz-placeholder

Similar activities

TechOdeyssey

TechOdeyssey

University

20 Qs

รักษาความปลอดภัย

รักษาความปลอดภัย

University

27 Qs

Week 2 Cardiology Quizz

Week 2 Cardiology Quizz

University

20 Qs

Contract Costing

Contract Costing

University

20 Qs

Web Essentials -Quiz 1

Web Essentials -Quiz 1

University

20 Qs

Cancer & Oncology Nursing Quiz

Cancer & Oncology Nursing Quiz

University - Professional Development

20 Qs

strategic management quiz 2

strategic management quiz 2

University

25 Qs

School Reopening: Hybrid Learning

School Reopening: Hybrid Learning

KG - Professional Development

24 Qs

Unit 2 - Objective Questions

Unit 2 - Objective Questions

Assessment

Quiz

Other

University

Medium

Created by

vijeta songire

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Footprinting mainly refers to:

Finding usernames and passwords

Collecting information about a target system

Exploiting system vulnerabilities

Installing backdoors

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is an example of passive footprinting?

Using Nmap scan

Ping sweep

Checking WHOIS records

Port scanning

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Google Dorking is primarily used for:

Encrypting passwords

Searching hidden or sensitive information online

Blocking malware websites

Scanning open ports

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of these is a valid Google Dork operator?

run:

intitle:

-exec:

chmod:

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The process of identifying which hosts are active on a network is called:

Privilege escalation

Host discovery

Banner grabbing

Dictionary attack

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which tool is commonly used for identifying live hosts?

Telnet

Nmap

John the Ripper

Hydra

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

In port scanning, a TCP connect scan:

Skips the handshake process

completes the full three-way handshake

Sends UDP packets only

Hides scanning from firewalls

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?