Certified Ethical Hacker Scholarship Test Posted by 3.0 University Date July 3, 2024 Comments 0 comment Welcome to your Certified Ethical Hacker Scholarship Test Name Email Phone Which of the following is a common method for an attacker to gain control of a user's session? SQL injection Session hijacking Cross-site scripting Buffer overflow None Which protocol is used to securely transfer files over the Internet? Telnet FTP SFTP HTTP None What does the acronym "SQL" stand for? Secure Query Language Standard Query Language Simple Query Language Structured Query Language None What does the term "phishing" refer to? Encrypting data Disabling security systems Cracking passwords Tricking users into revealing personal information None Which of the following is a type of malware that locks a user's data and demands payment for its release? Ransomware Spyware Worm Virus None What is the purpose of penetration testing? To evaluate the security of a system by simulating an attack To prevent data breaches To develop new security software To monitor network traffic None What does the term "whitelisting" mean in cybersecurity? Monitoring network traffic Encrypting sensitive data Allowing only approved entities or addresses Blocking malicious websites None What is "social engineering" in the context of cybersecurity? Breaking encryption algorithms Manipulating people to gain confidential information Designing secure networks Coding malicious software None What is a brute force attack? Exploiting software vulnerabilities Trying all possible combinations to crack a password Using social engineering to gain access Monitoring network traffic None What does the term "zero-day vulnerability" refer to? A fully patched and secure system A known vulnerability with a fix available A previously unknown vulnerability with no fix available A vulnerability in obsolete software None What is the purpose of an SSL/TLS certificate? To scan for malware To secure communications over the internet To manage user passwords To monitor network traffic None What is the primary purpose of two-factor authentication? To simplify password management To log user activity To encrypt data To enhance security by requiring two forms of identification None What term describes a type of malware that creates a hidden entry point into a computer system, allowing remote access and control by attackers for malicious purposes? Phishing Spoofing Backdoor Trojan SQL Injection None What is the primary objective of a denial-of-service (DoS) attack? To intercept communication between two parties To encrypt internet traffic To create hidden entry points into computer systems To flood a system with traffic and make it unavailable to users None What is a security patch? A firewall rule A type of malware An update to fix vulnerabilities in software Exploiting software vulnerabilities None 1 out of 3 Share: 3.0 University Previous post Cybersecurity Scholarship Test July 3, 2024 Next post Certified Ethical Hacker Scholarship Test - Million Minds July 17, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025