
Cybersecurity Workshop
Authored by Siddarth N
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
In ethical hacking, which of the following activities is not part of the reconnaissance phase?
Gathering subdomain information using OSINT tools
Scanning open ports on the target system
Checking data breaches using HaveIBeenPwned
Identifying technologies used on a website with Wappalyzer
2.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
The tool HaveIBeenPwned is primarily used to:
Scan for malware in an infected system
Check if email credentials have been exposed in data breaches
Test network packet loss
Identify open ports on a web server
3.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
In the 5 phases of ethical hacking, the step “Maintaining Access” refers to:
Creating a backdoor or persistence method after gaining entry
Gathering initial system information
Installing antivirus to protect the system
Scanning network firewalls
4.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
Which of the following OSINT tools can be used to view historical versions of a website?
Netcraft
Wayback Machine
Wappalyzer
Shodan
5.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
The difference between active and passive reconnaissance is that:
Passive methods involve direct interaction with the target
Active methods rely on open-source intelligence only
Active reconnaissance can alert the target due to direct probing
Passive reconnaissance is illegal in all cases
6.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
What does Wappalyzer help a cybersecurity professional identify?
The operating system of a target host
The technologies and frameworks used by a website
IP address location
Email server vulnerabilities
7.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
Which of the following combinations correctly lists ethical hacking phases in order?
Scanning → Reconnaissance → Gaining Access → Maintaining Access → Covering Tracks
Reconnaissance → Scanning → Gaining Access → Maintaining Access → Covering Tracks
Gaining Access → Scanning → Reconnaissance → Covering Tracks → Maintaining Access
Reconnaissance → Gaining Access → Scanning → Covering Tracks → Maintaining Access
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?