
Bug Bounty Program Certification 5.2: Find Major Bugs in Server
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the default port number used by the Nessus web client?
8888
8443
8834
8080
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a scan profile available in Nessus?
Advanced Scan
Cloud Scan
Firewall Scan
Shellshock Scan
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When setting up a network scan in Nessus, what is the correct way to specify a range of IP addresses?
192.168.0.1-192.168.0.254
192.168.0.1,192.168.0.254
192.168.0.1/192.168.0.254
192.168.0.1 to 192.168.0.254
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do after setting up a scan project in Nessus?
Reboot the server
Click 'Save' and then 'Launch'
Update the Nessus software
Restart the Nessus service
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which color represents a critical vulnerability in Nessus scan results?
Green
Orange
Blood Red
Blue
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the significance of port number 445 in the context of SMB vulnerabilities?
It is used for HTTP traffic
It is the default port for FTP
It is used for DNS queries
It is associated with SMB protocol
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can you do if you want to create a new policy in Nessus?
Click on 'Policies' and then 'Create New Policy'
Update the Nessus plugins
Go to the 'Settings' tab
Restart the Nessus application
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
3 questions
WikiLeaks Releases CIA Hacking Tools, FBI Probes
Interactive video
•
University
6 questions
Java Programming for Complete Beginners - Java 16 - Step 01 - Getting Started with Spring Framework – Goals
Interactive video
•
University
6 questions
Australia Passes Anti-Encryption Law
Interactive video
•
University
6 questions
Ciaran Martin outlines future of cyber security in the UK
Interactive video
•
University
8 questions
DNS Poisoning Attack
Interactive video
•
University
8 questions
Python for Network Forensics 2.2: Populating File Properties
Interactive video
•
University
3 questions
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Poisoning Attacks
Interactive video
•
University
3 questions
Revolutionary Car Defense System Unveiled for War Zones
Interactive video
•
KG - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University