INTRODUCTION
Malware and its Types
CIA Triad
TYPES OF ATTACKS
Social Engineering
Types of Social Engineering Attacks
Why does Social Engineering works?
Denial of Service
Man In The Middle
Buffer Overflow
Injection attacks
Cross Site Scripting
ARP Poisoning
DNS Poisoning
Privilege Escalation
Amplification Attack
Man In The Browser Attack
Zero Day Attack
Replay Attack
Pass the Hash
Hijacking Attacks
Shimming and Refactoring
MAC and IP spoofing
Wireless Attacks
Cryptographic Attacks Types
Cryptographic Attacks Details
Birthday
Known plain textcipher text
Rainbow tables
Dictionary
Brute force
Collision
downgrade
Replay
Weak Implementations
Threat actor and their types
Penetration Testing
Penetration Testing vs Vulnerability Scanning
Vulnerability Scanning
Vulnerabilities Types & Impacts
Firewall & its Types
VPN Virtual Private Network
NIPS - Network Intrusion Prevention System | NIDS - Network Intrusion Detection System
Router
Switch
Proxy & its Types
Load balancer
Access Point
SIEM Security Information and Event Management
DLP Data Loss Prevention
NAC Network Access Control
Mail Gateway
Advanced Network Technologies Bridge, SSLTLS Accelerators, Decryptors, Media Gateway, HSM
Protocol Analyzer
Network Scanners
Wireless Scanners
Password Crackers
Vulnerability Scanner
Configuration compliance scanner
Exploitation frameworks
Data sanitization tools
SHREE LEARNING ACADEMY
Toggle Menu
Home
Tutorial
Quiz
Penetration Testing Quiz
What is the primary goal of Penetration Testing?
Simulate cyber-attacks to find system strengths
Simulate cyber-attacks to find vulnerabilities
To breach a system and gain unauthorized access
To educate employees on cybersecurity best practices
What is Active Reconnaissance?
Indirectly gathering information about a target
Directly interacting with the target to gather information
Checking open ports and services
Gaining enhanced access rights
What tool might you use for Port Scanning?
LinkedIn
Nmap
Wireshark
Netstat
In which type of testing is there no prior knowledge of the system
Black Box Testing
White Box Testing
Gray Box Testing
All of the above
What is Persistence in the context of Penetration Testing?
First successful breach
Maintaining long-term access
Gaining enhanced access rights
Active interaction with the target
Submit answers
Your Score:
Go To Website's Tutorial Page
Read Tutorial
Watch our Video Tutorial