Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1

Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This video tutorial covers a range of topics related to bug bounty exam practice questions. It includes discussions on the default port numbers for FTP and Nessus, Nmap commands for UDP and stealth scanning, and the differences between Black Hat and White Hat hackers. The video also explores various malware types, their characteristics, and tools for network monitoring and brute force attacks. Additionally, it provides insights into port scanning tools and the Drozer application used for SQL injection attacks.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default port number used by the FTP protocol?

25

23

22

21

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Nmap command is used for UDP scanning?

nmap -sS

nmap -sP

nmap -sT

nmap -sU

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary difference between a Black Hat Hacker and a White Hat Hacker?

Both work illegally

Both work legally

Black Hat works illegally, White Hat works legally

Black Hat works legally, White Hat works illegally

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware must attach itself to an innocent file to exist?

Rootkit

Trojan

Worm

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware is known to be undetectable and hardest to find on a server?

Rootkit

Keylogger

Worm

Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is primarily used for network traffic monitoring?

Ettercap

Nmap

Wireshark

Hydra

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to perform a brute force attack in Kali Linux?

Nmap

Dmitry

Hydra

Recon-ng