Certificate in Ethical Hacking (B23)
-
🔴 Ethical Hacking (Live Class) 10:00am
-
Welcome
-
Recordings11 Topics
-
Recording: CEH B23 Zoom Class 1 Video 09 January 2023
-
Recording: CEH B23 Zoom Class 2 Video 11 January 2023
-
Recording: CEH B23 Zoom Class 3 Video 13 January 2023
-
Recording: CEH B23 Zoom Class 4 Video 16 January 2023
-
Recording: CEH B23 Zoom Class 5 Video 18 January 2023
-
Recording: CEH B23 Zoom Class 6 Video (Part A) 20 January 2023
-
Recording: CEH B23 Zoom Class 6 Video (Part B) 20 January 2023
-
Recording: CEH B23 Zoom Class 7 Video 23 January 2023
-
Recording: CEH B23 Zoom Class 8 Video 25 January 2023
-
Recording: CEH B23 Zoom Class 9 Video 27 January 2023
-
Recording: CEH B23 Zoom Class 10 Video 30 January 2023
-
Recording: CEH B23 Zoom Class 1 Video 09 January 2023
-
Introduction to Ethical Hacking4 Topics
-
Introduction to Kali Linux4 Topics
-
Anonymity3 Topics
-
Reconnaissance7 Topics
-
Sniffing5 Topics
-
Port Scanning3 Topics
-
Enumeration2 Topics
-
Evading IDS, Firewall, and Honeypots2 Topics
-
Vulnerability Assessment/Analysis3 Topics
-
Password Hacking5 Topics
-
Server Hacking3 Topics
-
System Hacking5 Topics
-
Malware Threat3 Topics
-
Hacking Mobile Platform2 Topics
-
Hacking Wireless Network5 Topics
-
Denial Of Service6 Topics
-
Social Engineering2 Topics
-
Cryptography2 Topics
-
Steganography2 Topics
-
Web Application Hacking3 Topics
-
Session Hijacking2 Topics
-
SQL injection3 Topics
-
Broken Access Control3 Topics
-
IOT and OT Hacking3 Topics
-
Ethical Hacking CA Test1 Quiz
-
Ethical Hacking – Examination
Quizzes
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
Question 1
Which of the following statements best describes a white-hat hacker?CorrectIncorrect -
Question 2 of 20
2. Question
Question 2
A security audit performed on the internal network of an organization by the network administration is also known as?CorrectIncorrect -
Question 3 of 20
3. Question
Question 3
What is the first phase of hacking?CorrectIncorrect -
Question 4 of 20
4. Question
Question 4
Which type of hacker represents the highest risk to your network?CorrectIncorrectHint
They are staff of that organisation.
-
Question 5 of 20
5. Question
Question 5
Hacking for a cause is called?CorrectIncorrectHint
The anonymous group.
-
Question 6 of 20
6. Question
Question 6
When a hacker attempts to attack a host via the Internet it is known as what type of attack?CorrectIncorrectHint
Synonym for online job.
-
Question 7 of 20
7. Question
Question 7
Which phase of hacking performs actual attack on a network or system?CorrectIncorrect -
Question 8 of 20
8. Question
Question 8
What is the best statement for taking advantage of a weakness in the security of an IT system?
CorrectIncorrectHint
A weakness in security is exploited. An attack does the exploitation. A weakness is vulnerability. A threat is a potential vulnerability.
-
Question 9 of 20
9. Question
Question 9
What is the next step to be performed after footprinting?CorrectIncorrect -
Question 10 of 20
10. Question
Question 10
Which of the following command is used to create file in Linux?CorrectIncorrect -
Question 11 of 20
11. Question
Question 11
Which command is/are used to remove directory in Linux?CorrectIncorrect -
Question 12 of 20
12. Question
Question 12
Which command(s) is/are used to get help about a command in Linux?CorrectIncorrect -
Question 13 of 20
13. Question
Question 13
Which of the following OS is not based on Linux?
CorrectIncorrect -
Question 14 of 20
14. Question
Question 14
What command is used to list contents of directories?
CorrectIncorrect -
Question 15 of 20
15. Question
Question 15
Hidden files can be seen using?CorrectIncorrect -
Question 16 of 20
16. Question
Question 16
Which of the following directories contains configuration files in linux?CorrectIncorrect -
Question 17 of 20
17. Question
Question 17
mv command can be used for?CorrectIncorrect -
Question 18 of 20
18. Question
Question 18
Why would hackers want to cover their tracks?CorrectIncorrect -
Question 19 of 20
19. Question
Question 19
Which of the following is a system designed to attract and identify hackers?CorrectIncorrect -
Question 20 of 20
20. Question
Question 20
A system that performs attack recognition and alerting for a network is what?CorrectIncorrect