INTRODUCTION
Malware and its Types
CIA Triad
TYPES OF ATTACKS
Social Engineering
Types of Social Engineering Attacks
Why does Social Engineering works?
Denial of Service
Man In The Middle
Buffer Overflow
Injection attacks
Cross Site Scripting
ARP Poisoning
DNS Poisoning
Privilege Escalation
Amplification Attack
Man In The Browser Attack
Zero Day Attack
Replay Attack
Pass the Hash
Hijacking Attacks
Shimming and Refactoring
MAC and IP spoofing
Wireless Attacks
Cryptographic Attacks Types
Cryptographic Attacks Details
Birthday
Known plain textcipher text
Rainbow tables
Dictionary
Brute force
Collision
downgrade
Replay
Weak Implementations
Threat actor and their types
Penetration Testing
Penetration Testing vs Vulnerability Scanning
Vulnerability Scanning
Vulnerabilities Types & Impacts
Firewall & its Types
VPN Virtual Private Network
NIPS - Network Intrusion Prevention System | NIDS - Network Intrusion Detection System
Router
Switch
Proxy & its Types
Load balancer
Access Point
SIEM Security Information and Event Management
DLP Data Loss Prevention
NAC Network Access Control
Mail Gateway
Advanced Network Technologies Bridge, SSLTLS Accelerators, Decryptors, Media Gateway, HSM
Protocol Analyzer
Network Scanners
Wireless Scanners
Password Crackers
Vulnerability Scanner
Configuration compliance scanner
Exploitation frameworks
Data sanitization tools
SHREE LEARNING ACADEMY
Toggle Menu
Home
Tutorial
Quiz
Vulnerability Scanning Quiz
What is the primary purpose of vulnerability scanning?
To launch cyberattacks
To identify security weaknesses
To act as a firewall
To actively block threats
Which of the following is NOT a popular vulnerability assessment tool mentioned?
Nessus
OpenVAS
Norton
Qualys
What is the main difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
IDS actively blocks threats, IPS only observes
IDS observes and reports, IPS actively blocks threats
IDS and IPS are the same
IDS requires specialized knowledge, IPS does not
What is a false positive in the context of vulnerability scanning?
A real vulnerability that goes undetected
An incorrect alert for a vulnerability
A correct alert for a vulnerability
A database that is not up-to-date
What does a "deny-by-default" approach mean?
Ignore all security alerts
Assume all elements are secure
Assume all elements are vulnerable
Only patch critical vulnerabilities
Submit answers
Your Score:
Go To Website's Tutorial Page
Read Tutorial
Watch our Video Tutorial