Nick Academy: Book 2 Quiz

A digital art image depicting a cyber security expert analyzing network traffic on a computer, with visual elements representing different security tools and data streams, in a modern tech environment.

Network Security Quiz

Test your knowledge on network security concepts and tools with our engaging quiz! This quiz is ideal for security enthusiasts, students, and professionals looking to assess their understanding of key topics in the field of network administration and penetration testing.

Quiz Highlights:

  • 10 multiple-choice questions
  • Score tracking
  • Immediate feedback on your answers
10 Questions2 MinutesCreated by HackingFalcon202
SNMP uses a password authentication mechanism called a ________________,
Secret
MIB
Community string
Ypcat passwd
Which of the following tools is strictly used to scrub metadata?
FOCA
Maltego
Spiderfoot
Veil
An attacker wants to scan a machine for any open ports. However, they are worried about being detected so they opt to use a "half-open" scan which drops the 3rd leg of the TCP handshake. Which command would they use?
Nmap -sC 10.1.1.2 -p-
Nmap -sN 10.1.1.2 -p-
Nmap -sT 10.1.1.2 -p-
Nmap -sS 10.1.1.2 -p-
While Scapy can manipulate network traffic by sending packets, it can also receive packets. If I wanted to receive Layer 2 packets what command would I use?
Sr(mypacket)
Srp(mypacket)
Receive(mypacket)
Sreceive(mypacket)
According to SANS, all recent MSF exploits are written in which language?
Python
Ruby
Perl
C++
This tool uses a "Get-Attack" command that can help you find a specific attack by using keywords.
PS>Attack
Powershell Empire
Apfell
Magic Unicorn
_______ enables testers to enter OS shell commands through the web app input vectors.
XSS
XSRF
Command Injection
Session Hijacking
Jared recently created a website where people vote on their favorite Truly flavor. While using the site from a client side proxy, Nick notices there are no session/token variables applied to his login. Nick, being an avid fan of Strawberry Lemonade decides he wants to manipulate the poll and send multiple votes for his fav flavor. Which Burp feature would Nick use?
Intruder
Sequencer
Comparer
Repeater
Nick is in the process of making PizzaPals.com, a social media website for other home cooks. Unfortunately Nick was in a rush while creating the homepage and accidently left in a html comment that contains credentials to a /VIP directory that would hold sensitive information on the most elite home cooks. According to SANS, this is an example of ________.
Injection Flaw
Data Exposure
Server Configuration Issue
Pivoting
Nick receives an unsuspecting call from an executive working at Peeps International. The executive tells Nick they want him to be the face of their new "Peeporini Pizza" flavor, all they need to get started with the process is Nick's SSN, DOB, and CCN. According to SANS, this is an example of ________.
Phishing
Tailgating
Pretexting
Profiling
{"name":"Nick Academy: Book 2 Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on network security concepts and tools with our engaging quiz! This quiz is ideal for security enthusiasts, students, and professionals looking to assess their understanding of key topics in the field of network administration and penetration testing.Quiz Highlights:10 multiple-choice questionsScore trackingImmediate feedback on your answers","img":"https:/images/course6.png"}
Powered by: Quiz Maker