Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3

Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This video covers a range of cybersecurity topics, including web server scanning tools, network protocols, encryption algorithms, DNS port numbers, word list creation, testing types, network attacks, and time synchronization protocols. It provides practice questions and answers to help learners understand these concepts better.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is not suitable for web server scanning?

Nessus

Nikto

Victor

Rekon

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Nmap command with '-F' signify?

Ping Scan

TCP Scan

Quick Scan

Stealth Scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is used in the shadow file of Kali Linux?

DES

AES

SHA

MD5

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number is used by DNS?

53

25

80

443

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is used to create word lists in Kali Linux?

Crunch

Dimitri

Nikto

John

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of knowledge is associated with gray box testing?

Advanced knowledge

Complete knowledge

Partial knowledge

No knowledge

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used for time synchronization?

NTP

NAT

DHCP

ASN