What is primary goal of ethical hacking?
Anonymous Quiz
44%
Testing security controls
1%
Avoiding detection
54%
Resolving security vulnerabilities
1%
Return on investment for security measures
What is first phase pf hacking?
Anonymous Quiz
48%
Reconnaissance
37%
Scanning
11%
Gaining access
4%
Maintaining access
What type of hacker represents the highest risk to your network?
Anonymous Quiz
15%
Script kiddies
27%
Disgruntled employees
8%
Grey hat Hackers
51%
Black hat Hackers
Which tool can be used for network scanning?
Anonymous Quiz
9%
Zenmap
43%
Nmap
4%
Nessus
44%
All of these
Ethical Hacking is also known as?
Anonymous Quiz
67%
White hat hacking
1%
Penetration testing
26%
Both of them
6%
None of these
Hacking for cause is called?
Anonymous Quiz
24%
Black hat hacking
8%
Activism
51%
Hacktivism
17%
Active hacking
When a hacker attempts to attack a host via the internet it is known as what type of attack?
Anonymous Quiz
11%
Local access
70%
Remote attack
19%
Internal attack
0%
Physical access
A hacktivist is someone who?
Anonymous Quiz
65%
Hacks computer or websites in an attempt to promote political ideology
9%
Attempts to destroy the infrastructure components of governments
15%
Violates computer or internet security maliciously or for illegal personal gain
12%
Attempts to gain financially or disrupt a company's information systems and business operations
XSS is a ?
Anonymous Quiz
28%
Server side attack
53%
Cross side attack
15%
Man in middle attack
4%
Post exploitation attack
Wireshark can be used for?
Anonymous Quiz
12%
Create payload
9%
Send payload
69%
Analyze network packet
10%
Crack password
I hope you guys enjoyed ❤️
For getting chance to win ethical hacking e-book message your name here @geekcodevipbot
For getting chance to win ethical hacking e-book message your name here @geekcodevipbot
Forwarded from Cyber Agents
New ransomware variants keep popping up despite law enforcement actions.
Researchers are now warning about "Avos Locker" that uses new tactics including disabling endpoint security products on targeted systems and booting it into Safe Mode.
Read more here!
@cyberaegnts
Researchers are now warning about "Avos Locker" that uses new tactics including disabling endpoint security products on targeted systems and booting it into Safe Mode.
Read more here!
@cyberaegnts
#geeks
Programming is not just a necessity, it's pure fun! Mainly to hack things
JavaScript 1 for Hackers (https://lnkd.in/erW7W3G)
JavaScript 2 for Hackers (https://lnkd.in/eUUyTie6)
Python 1 for Hackers (https://lnkd.in/eiWZayBa)
C# for Hackers (https://lnkd.in/eZvFTa9x)
C for Hackers (https://lnkd.in/dEbzDcYE)
@geekcode
Programming is not just a necessity, it's pure fun! Mainly to hack things
JavaScript 1 for Hackers (https://lnkd.in/erW7W3G)
JavaScript 2 for Hackers (https://lnkd.in/eUUyTie6)
Python 1 for Hackers (https://lnkd.in/eiWZayBa)
C# for Hackers (https://lnkd.in/eZvFTa9x)
C for Hackers (https://lnkd.in/dEbzDcYE)
@geekcode