Search Header Logo

Cybersecurity Workshop

Authored by Siddarth N

Information Technology (IT)

University

Used 1+ times

Cybersecurity Workshop
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

In ethical hacking, which of the following activities is not part of the reconnaissance phase?

Gathering subdomain information using OSINT tools

Scanning open ports on the target system

Checking data breaches using HaveIBeenPwned

Identifying technologies used on a website with Wappalyzer

2.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

The tool HaveIBeenPwned is primarily used to:

Scan for malware in an infected system

Check if email credentials have been exposed in data breaches

Test network packet loss

Identify open ports on a web server

3.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

In the 5 phases of ethical hacking, the step “Maintaining Access” refers to:

Creating a backdoor or persistence method after gaining entry

Gathering initial system information

Installing antivirus to protect the system

Scanning network firewalls

4.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

Which of the following OSINT tools can be used to view historical versions of a website?

Netcraft

Wayback Machine

Wappalyzer

Shodan

5.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

The difference between active and passive reconnaissance is that:

Passive methods involve direct interaction with the target

Active methods rely on open-source intelligence only

Active reconnaissance can alert the target due to direct probing

Passive reconnaissance is illegal in all cases

6.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

What does Wappalyzer help a cybersecurity professional identify?

The operating system of a target host

The technologies and frameworks used by a website

IP address location

Email server vulnerabilities

7.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

Which of the following combinations correctly lists ethical hacking phases in order?

Scanning → Reconnaissance → Gaining Access → Maintaining Access → Covering Tracks

Reconnaissance → Scanning → Gaining Access → Maintaining Access → Covering Tracks

Gaining Access → Scanning → Reconnaissance → Covering Tracks → Maintaining Access

Reconnaissance → Gaining Access → Scanning → Covering Tracks → Maintaining Access

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?