Certified Ethical Hacker Scholarship Test – Million Minds Posted by 3.0 University Date July 17, 2024 Comments 0 comment Welcome to your Certified Ethical Hacker Scholarship Test - Million Minds Name Email Phone Which of the following is a common method for an attacker to gain control of a user's session? Session hijacking SQL injection Buffer overflow Cross-site scripting None What is a brute force attack? Exploiting software vulnerabilities Using social engineering to gain access Trying all possible combinations to crack a password Monitoring network traffic None What does the term "phishing" refer to? Cracking passwords Tricking users into revealing personal information Encrypting data Disabling security systems None What does the term "zero-day vulnerability" refer to? A known vulnerability with a fix available A fully patched and secure system A vulnerability in obsolete software A previously unknown vulnerability with no fix available None What is the purpose of penetration testing? To develop new security software To evaluate the security of a system by simulating an attack To prevent data breaches To monitor network traffic None What is the primary objective of a denial-of-service (DoS) attack? To intercept communication between two parties To flood a system with traffic and make it unavailable to users To create hidden entry points into computer systems To encrypt internet traffic None What term describes a type of malware that creates a hidden entry point into a computer system, allowing remote access and control by attackers for malicious purposes? Backdoor Trojan Phishing Spoofing SQL Injection None What does the acronym "SQL" stand for? Simple Query Language Secure Query Language Standard Query Language Structured Query Language None What is "social engineering" in the context of cybersecurity? Manipulating people to gain confidential information Coding malicious software Designing secure networks Breaking encryption algorithms None What is a security patch? A type of malware A firewall rule An update to fix vulnerabilities in software Exploiting software vulnerabilities None What is the purpose of an SSL/TLS certificate? To secure communications over the internet To scan for malware To monitor network traffic To manage user passwords None Which of the following is a type of malware that locks a user's data and demands payment for its release? Virus Spyware Worm Ransomware None What is the primary purpose of two-factor authentication? To log user activity To simplify password management To encrypt data To enhance security by requiring two forms of identification None What does the term "whitelisting" mean in cybersecurity? Monitoring network traffic Blocking malicious websites Allowing only approved entities or addresses Encrypting sensitive data None Which protocol is used to securely transfer files over the Internet? Telnet SFTP HTTP FTP None 1 out of 3 Share: 3.0 University Previous post Certified Ethical Hacker Scholarship Test July 17, 2024 Next post Certified Ethical Hacker v13 Scholarship Test October 1, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025