Certified Ethical Hacker Scholarship Test – Million Minds Posted by 3.0 University Date July 17, 2024 Comments 0 comment Welcome to your Certified Ethical Hacker Scholarship Test - Million Minds Name Email Phone What does the term "whitelisting" mean in cybersecurity? Blocking malicious websites Monitoring network traffic Allowing only approved entities or addresses Encrypting sensitive data None Which protocol is used to securely transfer files over the Internet? FTP HTTP SFTP Telnet None What is the purpose of penetration testing? To prevent data breaches To monitor network traffic To develop new security software To evaluate the security of a system by simulating an attack None What does the acronym "SQL" stand for? Standard Query Language Structured Query Language Simple Query Language Secure Query Language None What is a security patch? Exploiting software vulnerabilities A type of malware A firewall rule An update to fix vulnerabilities in software None What is a brute force attack? Trying all possible combinations to crack a password Monitoring network traffic Using social engineering to gain access Exploiting software vulnerabilities None What term describes a type of malware that creates a hidden entry point into a computer system, allowing remote access and control by attackers for malicious purposes? Backdoor Trojan Spoofing SQL Injection Phishing None Which of the following is a type of malware that locks a user's data and demands payment for its release? Ransomware Worm Virus Spyware None What does the term "phishing" refer to? Tricking users into revealing personal information Encrypting data Cracking passwords Disabling security systems None What does the term "zero-day vulnerability" refer to? A previously unknown vulnerability with no fix available A vulnerability in obsolete software A fully patched and secure system A known vulnerability with a fix available None What is the primary objective of a denial-of-service (DoS) attack? To flood a system with traffic and make it unavailable to users To create hidden entry points into computer systems To encrypt internet traffic To intercept communication between two parties None What is the primary purpose of two-factor authentication? To enhance security by requiring two forms of identification To log user activity To encrypt data To simplify password management None What is "social engineering" in the context of cybersecurity? Breaking encryption algorithms Manipulating people to gain confidential information Designing secure networks Coding malicious software None Which of the following is a common method for an attacker to gain control of a user's session? Cross-site scripting Session hijacking Buffer overflow SQL injection None What is the purpose of an SSL/TLS certificate? To scan for malware To monitor network traffic To secure communications over the internet To manage user passwords None 1 out of 3 Share: 3.0 University Previous post Certified Ethical Hacker Scholarship Test July 17, 2024 Next post Certified Ethical Hacker v13 Scholarship Test October 1, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025