
Introduction to Ethical Hacking
Authored by Leena Namboothiri
Information Technology (IT)
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes ethical hacking in a professional cybersecurity context?
Authorized simulations to assess security weaknesses
Passive monitoring of network traffic for trends
Unauthorized probing to find exploitable flaws
Routine system maintenance and software updates
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which action best exemplifies spoofing in a cybersecurity context?
Encrypting files to protect sensitive data
Sending forged emails with a fake sender identity
Flooding a server with excessive traffic requests
Probing a host to discover open network ports
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which option best describes a back door in software security?
An antivirus feature scanning for malware signatures
A network firewall blocking unauthorized connections
A hidden mechanism bypassing standard authentication
An official login page requiring normal credentials
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker disguises malicious code inside a legitimate installer. What method of gaining access is being used?
Trojan horse masquerading as trusted software
Password guessing on the normal login screen
Side channel attack exploiting timing leakage
Back door left for debugging and diagnostics
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which example is a side-channel attack relying on indirect leakage from hardware behavior?
Power analysis of CPU consumption to infer keys
WiFi packet sniffing for session tokens
Phishing with urgent password reset emails
USB drop in office parking areas
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To estimate an encryption key without breaking the algorithm directly, which method applies?
Perform ARP spoofing to impersonate a gateway
Measure encryption timing variations per operation
Send spoofed emails requesting login credentials
Leave infected USB drives in common areas
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which action best aligns with legal ethical hacking practice before conducting tests?
Access a network without prior approval
Search current laws and local regulations
Install test malware on target systems
Launch limited DoS to gauge resilience
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
komputasi awan
Quiz
•
University
15 questions
İstifadəçi interfeysi
Quiz
•
University
10 questions
Quiz 1 Normalisasi
Quiz
•
University
12 questions
QUIZ KEJAHATAN DUNIA MAYA
Quiz
•
University
10 questions
Data Visualization with Qlik Cloud
Quiz
•
University
10 questions
Los 10 escalones
Quiz
•
University
15 questions
Mobile Programming - POCC
Quiz
•
University
15 questions
Контроль качества ИС
Quiz
•
12th Grade - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University