
Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the default port number used by the FTP protocol?
25
23
22
21
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Nmap command is used for UDP scanning?
nmap -sS
nmap -sP
nmap -sT
nmap -sU
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary difference between a Black Hat Hacker and a White Hat Hacker?
Both work illegally
Both work legally
Black Hat works illegally, White Hat works legally
Black Hat works legally, White Hat works illegally
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware must attach itself to an innocent file to exist?
Rootkit
Trojan
Worm
Virus
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which malware is known to be undetectable and hardest to find on a server?
Rootkit
Keylogger
Worm
Virus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is primarily used for network traffic monitoring?
Ettercap
Nmap
Wireshark
Hydra
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool can be used to perform a brute force attack in Kali Linux?
Nmap
Dmitry
Hydra
Recon-ng
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?