My Report

Cyber Security Practice Test 1


Correct Answer: 2 points | Wrong: -1 point
Grades: A* (100% score) | A (80%-99%) | B (60%-80%) | C (40%-60%) | D (0%-40%)
advertisement

1. Which method of hacking will record all your keystrokes?

2. Role of security auditor is to ____________

3. In which year the first popular hacker conference took place?

4. _______ of information means, only authorised users are capable of accessing the information.

5. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

6. How many basic processes or steps are there in ethical hacking?

7. Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?

8. In which year the Computer Fraud & Abuse Act was adopted in the United States?

9. While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.

10. Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________


 

Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.