Certified Ethical Hacker Scholarship Test – Million Minds Posted by 3.0 University Date July 17, 2024 Comments 0 comment Welcome to your Certified Ethical Hacker Scholarship Test - Million Minds Name Email Phone What does the term "phishing" refer to? Encrypting data Cracking passwords Disabling security systems Tricking users into revealing personal information None Which of the following is a common method for an attacker to gain control of a user's session? Session hijacking SQL injection Buffer overflow Cross-site scripting None What is a security patch? A type of malware An update to fix vulnerabilities in software A firewall rule Exploiting software vulnerabilities None What does the term "whitelisting" mean in cybersecurity? Allowing only approved entities or addresses Monitoring network traffic Blocking malicious websites Encrypting sensitive data None What is the purpose of penetration testing? To develop new security software To prevent data breaches To monitor network traffic To evaluate the security of a system by simulating an attack None What is the primary objective of a denial-of-service (DoS) attack? To create hidden entry points into computer systems To encrypt internet traffic To flood a system with traffic and make it unavailable to users To intercept communication between two parties None Which protocol is used to securely transfer files over the Internet? FTP Telnet SFTP HTTP None What is "social engineering" in the context of cybersecurity? Designing secure networks Manipulating people to gain confidential information Breaking encryption algorithms Coding malicious software None What is the purpose of an SSL/TLS certificate? To scan for malware To secure communications over the internet To monitor network traffic To manage user passwords None What term describes a type of malware that creates a hidden entry point into a computer system, allowing remote access and control by attackers for malicious purposes? Backdoor Trojan Spoofing Phishing SQL Injection None Which of the following is a type of malware that locks a user's data and demands payment for its release? Worm Ransomware Virus Spyware None What does the term "zero-day vulnerability" refer to? A known vulnerability with a fix available A fully patched and secure system A vulnerability in obsolete software A previously unknown vulnerability with no fix available None What is a brute force attack? Exploiting software vulnerabilities Trying all possible combinations to crack a password Using social engineering to gain access Monitoring network traffic None What is the primary purpose of two-factor authentication? To encrypt data To enhance security by requiring two forms of identification To log user activity To simplify password management None What does the acronym "SQL" stand for? Secure Query Language Simple Query Language Structured Query Language Standard Query Language None 1 out of 3 Share: 3.0 University Previous post Certified Ethical Hacker Scholarship Test July 17, 2024 Next post Certified Ethical Hacker v13 Scholarship Test October 1, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025