Which type of virus is known to specifically target Microsoft files?
Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Macro Virus
Polymorphic Virus
Stealth Virus
Cavity Virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Kali Linux, which file contains the encrypted passwords?
hosts
sam
shadow
networks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the default port number used by MySQL?
3307
3308
3306
3305
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack involves injecting commands into a database?
TTL Attack
Injection Attack
Zero Day Vulnerability
Cryptography Attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves transmitting commands without the user's awareness?
CSRF Attack
XSS Attack
Buffer Overflow
SQL Injection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which nmap command is used for a ping scan?
nmap -sn
nmap -sU
nmap -sX
nmap -sS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is a network vulnerability scanner?
Wireshark
Nmap
Acunetix
Nessus
Create a free account and access millions of resources
Similar Resources on Quizizz
8 questions
Fundamentals of Secure Software - Introduction to OWASP Top 10

Interactive video
•
University
6 questions
CompTIA Security+ Certification SY0-601: The Total Course - Nmap Lab

Interactive video
•
University
8 questions
Web Security: Common Vulnerabilities And Their Mitigation - The Open Web Application Security Project

Interactive video
•
University
5 questions
Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2

Interactive video
•
University
8 questions
Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1

Interactive video
•
University
11 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Brute Forcing SSH with Metasploit

Interactive video
•
University
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Exploiting Apache Tomcat with Metasploit

Interactive video
•
University
6 questions
CompTIA Security+ Certification SY0-601: The Total Course - Request Forgery Attacks

Interactive video
•
University
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
Discover more resources for Information Technology (IT)
10 questions
Identifying equations

Quiz
•
KG - University
16 questions
Chapter 8 - Getting Along with your Supervisor

Quiz
•
3rd Grade - Professio...
6 questions
Railroad Operations and Classifications Quiz

Quiz
•
University
71 questions
Logos

Quiz
•
3rd Grade - University
8 questions
Mali - Geography

Quiz
•
University