1.
In Cyber Security, which of these is used to scan a specific port with NMap?
2.
In Cyber Security, which of the following functions will you use to display a popup window to exploit an XSS vulnerability in a website?
3.
In Cyber Security, which of the following techniques will you use to steal the user credentials of the user on the target website that uses dynamically generated content?
4.
Which of the following is used to expand the SQL if you know the table and column names of a database?
5.
In Cyber Security, which of the following tools is used to perform information gathering?
6.
In Cyber Security, which of the following will you suggest to avoid customers' data theft and security breach?
7.
In Cyber Security, which of the following characters is not a SQL injection attack character?
8.
In Cyber Security, which of the following is also known as the half-open scan?
9.
In Cyber Security, which of the following is used to find the host file of a computer?
10.
In Cyber Security, which of the following techniques is used to create backdoors to covertly get information about the target?