
ChatGPT Quiz: Basics of Penetration Testing #1
Quiz by OXFORD SCHOOL
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is Penetration Testing?A software program that detects attempted cyber-attacksA computer system that is impenetrable to any type of cyber-attackNone of the aboveA simulated cyber-attack on a computer system to check for vulnerabilitiesA software program that blocks hackers from entering a computer system30s
- Q2What is the purpose of Penetration Testing?To prevent cyber-attacks from occurring in the first placeTo detect cyber-attacks in real-timeTo identify and exploit vulnerabilities in a computer system in order to improve its securityTo create a secure computer systemNone of the above30s
- Q3What are the two types of Penetration Testing?None of the aboveIntrusive and Non-Intrusive TestingWhite Box and Black Box TestingManual and Automated TestingStatic and Dynamic Testing30s
- Q4What is the difference between vulnerability scanning and penetration testing?Vulnerability scanning only works on certain types of computer systemsPenetration Testing is more expensive than vulnerability scanningVulnerability scanning identifies vulnerabilities, while Penetration Testing exploits themVulnerability scanning is more thorough than Penetration TestingNone of the above30s
- Q5What is Social Engineering?A type of Penetration Testing that focuses on vulnerabilities in social media platformsA method of encryption used in secure communicationA type of cyber-attack that uses malware to gain access to a computer systemNone of the aboveThe use of psychological manipulation to gain access to sensitive information or computer systems30s
- Q6What are the four phases of Penetration Testing?Planning, Discovery, Attack, and ReportingIdentification, Authentication, Authorization, and ReportingInformation Gathering, Scanning, Exploitation, and AegisTargeting, Scanning, Exploiting, and Maintaining AccessNone of the above30s
- Q7What is the scope of a Penetration Test?The type of Penetration Test that will be performedThe cost of the Penetration TestThe specific areas of a computer system that will be testedThe amount of time that the Penetration Test will takeNone of the above30s
- Q8What is the difference between a vulnerability and an exploit?A vulnerability is a type of cyber-attack, while an exploit is a type of defensive softwareA vulnerability is a weakness in a computer system, while an exploit is a method of taking advantage of that weaknessNone of the aboveA vulnerability is a type of computer hardware, while an exploit is a type of computer softwareA vulnerability is a method of encryption, while an exploit is a type of password30s
- Q9What is the purpose of a Penetration Testing report?To provide a detailed technical analysis of the computer systemTo summarize the findings of the Penetration Test and provide recommendations for improving the computer system's securityTo explain the methodology used in the Penetration TestNone of the aboveTo list all of the vulnerabilities found during the Penetration Test30s
- Q10What is the difference between a Denial of Service and a Distributed Denial of Service attack?A Denial of Service attack targets a single computer system, while a Distributed Denial of Service attack targets multiple computer systemsNone of the aboveA Denial of Service attack is easier to launch than a Distributed Denial of Service attackA Denial of Service attack is more difficult to detect than a Distributed Denial of Service attackA Denial of Service attack is launched from a single source, while a Distributed Denial of Service attack is launched from multiple sources30s