Certified Ethical Hacker Scholarship Test Posted by 3.0 University Date July 3, 2024 Comments 0 comment Welcome to your Certified Ethical Hacker Scholarship Test Name Email Phone What does the term "zero-day vulnerability" refer to? A previously unknown vulnerability with no fix available A fully patched and secure system A known vulnerability with a fix available A vulnerability in obsolete software None What is the primary purpose of two-factor authentication? To enhance security by requiring two forms of identification To log user activity To encrypt data To simplify password management None What is the primary objective of a denial-of-service (DoS) attack? To encrypt internet traffic To intercept communication between two parties To flood a system with traffic and make it unavailable to users To create hidden entry points into computer systems None What is the purpose of penetration testing? To evaluate the security of a system by simulating an attack To monitor network traffic To prevent data breaches To develop new security software None What does the acronym "SQL" stand for? Simple Query Language Standard Query Language Structured Query Language Secure Query Language None What does the term "whitelisting" mean in cybersecurity? Blocking malicious websites Allowing only approved entities or addresses Monitoring network traffic Encrypting sensitive data None Which protocol is used to securely transfer files over the Internet? HTTP SFTP Telnet FTP None What is a security patch? Exploiting software vulnerabilities An update to fix vulnerabilities in software A firewall rule A type of malware None Which of the following is a common method for an attacker to gain control of a user's session? Session hijacking Buffer overflow SQL injection Cross-site scripting None What is the purpose of an SSL/TLS certificate? To secure communications over the internet To monitor network traffic To manage user passwords To scan for malware None What is "social engineering" in the context of cybersecurity? Breaking encryption algorithms Manipulating people to gain confidential information Designing secure networks Coding malicious software None What does the term "phishing" refer to? Tricking users into revealing personal information Disabling security systems Encrypting data Cracking passwords None Which of the following is a type of malware that locks a user's data and demands payment for its release? Spyware Ransomware Worm Virus None What is a brute force attack? Monitoring network traffic Using social engineering to gain access Exploiting software vulnerabilities Trying all possible combinations to crack a password None What term describes a type of malware that creates a hidden entry point into a computer system, allowing remote access and control by attackers for malicious purposes? Spoofing Backdoor Trojan Phishing SQL Injection None 1 out of 3 Share: 3.0 University Previous post Cybersecurity Scholarship Test July 3, 2024 Next post Certified Ethical Hacker Scholarship Test - Million Minds July 17, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025