Created on 20th March 2024
What is the primary goal of ethical hacking? |
---|
Which of the following is NOT considered a phase of ethical hacking? |
What is the purpose of a vulnerability assessment? |
Which Linux command is used to create a new directory? |
What is a rootkit? |
Which of the following is an example of social engineering? |
What is the purpose of a firewall? |
Which Linux command is used to change file permissions? |
What is a SQL injection attack? |
Which of the following is a common vulnerability in web applications? |
What is the purpose of a honeypot? |
Which Linux command is used to view the content of a file? |
What is the purpose of vulnerability scanning? |
Which of the following is an example of a password attack? |
What is the purpose of encryption? |
Which Linux command is used to find files and directories based on their names? |
Try Now