Quiz — Cisco Ccst Security
View certificationSecurity
9 topics available
Mixed quiz
Mixed questions from all topics of this certification.
Mock exam
Real exam simulation with time limit and final score.
- Information Gathering and FootprintingTechniques for collecting public and private information about a target system or organization, fundamental in the initial phase of an attack.Open topic →
- Network and Port Scanning TechniquesMethods for identifying open ports, active services, and connected devices through network and port scanning.Open topic →
- Service and User EnumerationStrategies for identifying users, groups, and active services on a system with the aim of identifying potential weak points.Open topic →
- Vulnerability IdentificationTechniques and tools for detecting known vulnerabilities in systems, applications, or network configurations.Open topic →
- Access and Maintenance on SystemsApproaches used to gain access to remote systems and maintain presence over time without being detected.Open topic →
- Types and Behaviors of MalwareClassification of malware and their modes of spread, execution, and behavior within a system.Open topic →
- Session Interception and HijackingTechniques for intercepting data and communications, as well as for hijacking active sessions of users or administrators.Open topic →
- Social Engineering TechniquesAnalysis of social engineering methods used to manipulate users and gain unauthorized access to systems or information.Open topic →
- Web Application AttacksAttack techniques aimed at vulnerabilities in web applications, such as SQL injection, XSS, and client-side attacks.Open topic →