1) What is the primary role of an ethical hacker in an organization? a) To identify and fix security vulnerabilities b) To develop new software applications c) To monitor employee productivity d) To manage the organisation's finances 2) What is one common process used to vet ethical hackers? a) Performing background checks b) Conducting a financial audit c) Analysing social media activity d) Conducting a psychological assessment 3) Which tool is commonly used for network scanning? a) Nmap b) Photoshop c) Microsoft Word d) QuickBooks 4) What technique involves tricking individuals into revealing confidential information? a) SQL injection b) Man-in-the-middle attack c) Denial of Service (DoS) attack d) Phishing 5) During an ethical hacking test, what should be done if a critical vulnerability is found? a) Use it for personal gain b) Publicly disclose it on social media c) Immediately report it to the organisation d) Ignore it and continue testing 6) Which of the following is an important step after executing ethical hacking attacks? a) Ignoring the results b) Disposing of all collected data c) Documenting and reporting findings to stakeholders d) Celebrating the success of the attacks

Leaderboard

Visual style

Options

Switch template

Continue editing: ?