No student devices needed. Know more
15 questions
Who is known as cracker?
Hacker
Cryptologist
Developer
Software engineer
For bypassing the windows password, which software has to be Bypass....
Bootloader
OS
Boot menu
Monitor
1. What is the attack called “evil twin”?
Rogue access point
ARP poisoning
Session hijacking
MAC spoofing
What are the forms of password cracking techniques?
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
what is the primary goal of an Ethical Hacker ?
Avoiding detection
Testing security controls
Resolving security vulnerabilities
Determining return on investment for security measures
What is the first phase of hacking?
Maintaining access
Gaining access
Reconnaissance
Scanning
Full form of MAC?
Media address control
Media access control
Medium accessed control
None of the above
For selecting the OS image disk go to the _ menu?
What port number does HTTPS use?
53
443
80
21
What are the two basic types of attacks ?
Active and passive
Shell script and php script
Dos
DDos
Both 3 and 4
basic correct Script for batch program?
@echo
:Test
Start cmd
@echo:
:Test
Start cmd
Echo@:
Test:
Start cmd
Echo:
:Test
Start cmd
Extension for batch program?
.bak
.bah
.bat
.batch
Junk Packet based attack which is done for some permanent damage?
Dos
Script based
DDOS
Shell based
Linux bootloader ?
Boot menu
Bin
Grub
Kali
Ethical hacking is only for?
Illegal hacking
Legal hacking
Only for security
Both 2 and 3
Explore all questions with a free account