Online Exam Quiz

questionQuestion  1 to 30

Which of these is a popular vulnerability scanning tool?

  • Wireshark
  • Nmap
  • Nessus
  • Hydra
Mark for review

What is a "zero-day" vulnerability?

  • A vulnerability that has been patched
  • A known vulnerability with an available fix
  • A vulnerability that is exploited before being known
  • A minor software bug
Mark for review

What is the primary purpose of a firewall?

  • Block unauthorized access
  • Monitor network traffic
  • Manage user credentials
  • Encrypt data
Mark for review

Which of the following is used to detect and prevent unauthorized access to a network?

  • Firewall
  • IDS
  • Antivirus software
  • Proxy server
Mark for review

Which of the following is NOT a common hashing algorithm?

  • MD5
  • SHA-1
  • DES
  • SHA-256
Mark for review

Which protocol is used to transfer files between computers on a network?

  • FTP
  • HTTP
  • SMTP
  • DNS
Mark for review

What is "ethical hacking"?

  • Hacking for malicious purposes
  • Unauthorized data access
  • Legally breaking into systems to improve security
  • Monitoring user activity
Mark for review

Which of the following is an example of a strong password?

  • password123
  • 123456
  • Qwerty
  • P@ssw0rd!
Mark for review

Which of these is a cryptographic protocol designed to provide secure communication over a computer network?

  • HTTP
  • SSH
  • FTP
  • SMTP
Mark for review

What is the purpose of a honeypot in cybersecurity?

  • To attract and analyze attackers
  • To monitor network traffic
  • To protect against phishing
  • To encrypt data
Mark for review

What is "ransomware"?

  • A type of phishing attack
  • A type of malware that demands payment
  • A network sniffing tool
  • A vulnerability scanner
Mark for review

Which protocol is used to securely browse the web?

  • HTTP
  • FTP
  • HTTPS
  • SMTP
Mark for review

What is the main goal of ethical hacking?

  • To cause damage
  • To secure systems
  • To steal data
  • To gain unauthorized access
Mark for review

What does "CVE" stand for?

  • Common Vulnerabilities and Exposures
  • Computer Vulnerabilities Exploited
  • Common Vector Exploits
  • Computer Virus Exploits
Mark for review

Which of the following is a form of authentication?

  • Encryption
  • Token-based
  • VPN
  • Firewall
Mark for review

What does "DDoS" stand for?

  • Distributed Data of Service
  • Distributed Denial of Service
  • Denied Data of Service
  • Denial of Distributed Service
Mark for review

Which of the following is NOT a type of malware?

  • Virus
  • Worm
  • Trojan
  • Firewall
Mark for review

What does "APT" stand for in cybersecurity?

  • Advanced Persistent Threat
  • Advanced Penetration Testing
  • Adaptive Persistent Threat
  • Automated Penetration Testing
Mark for review

In ethical hacking, what is "social engineering"?

  • Network monitoring
  • Human-based attack techniques
  • Software vulnerability analysis
  • Physical security breaches
Mark for review

What does "MFA" stand for in cybersecurity?

  • Multi-Factor Authentication
  • Multi-Form Authentication
  • Multi-Factor Authorization
  • Multi-Form Authorization
Mark for review

What is the purpose of ethical hacking?

  • To hack systems for profit
  • To test security systems
  • To damage company reputation
  • To access sensitive information
Mark for review

Which of the following is a hash function?

  • AES
  • RSA
  • SHA-256
  • DES
Mark for review

Which of the following is a type of vulnerability scanner?

  • Nmap
  • Nessus
  • John the Ripper
  • Hydra
Mark for review

What is the main characteristic of a worm in cybersecurity?

  • Self-replicates
  • Requires user action to spread
  • Hides in legitimate programs
  • Steals data
Mark for review

What is "phishing"?

  • Unauthorized data access
  • Network intrusion
  • Email scam to obtain sensitive information
  • Exploiting software vulnerabilities
Mark for review

Which is a commonly used port scanning tool?

  • Nessus
  • Nmap
  • Wireshark
  • John the Ripper
Mark for review

Which tool is used for SQL injection?

  • John the Ripper
  • Sqlmap
  • Nessus
  • Hydra
Mark for review

What does "IDS" stand for?

  • Intrusion Detection System
  • Internet Detection System
  • Information Detection System
  • Intrusion Data System
Mark for review

What does the acronym "SQL" stand for?

  • Structured Query Language
  • Simple Query Language
  • Structured Question Language
  • Simple Question Language
Mark for review

Which of these is a form of social engineering attack?

  • Phishing
  • DDoS
  • Man-in-the-middle
  • SQL injection
Mark for review

blinkerOnline

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • Answered
  • Not Answered
  • Marked for Review