MCQOPTIONS
Bookmark
Saved Bookmarks
→
Cyber Security
→
Botnets
→
______________ is the first phase of ethical hacki...
1.
______________ is the first phase of ethical hacking.
A.
DNS poisoning
B.
Footprinting
C.
ARP-poisoning
D.
Enumeration
Answer» C. ARP-poisoning
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
Site-to-Site VPN architecture is also known as _________
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.
________ automates an action or attack so that repetitive tasks are done at a faster rate.
______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.
TACACS+ uses TCP port 49.
How many types of exploits are there based on their nature from hacking’s perspective?
Known exploits have a confirmation of and measures can be taken against it to resolve them.
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.
RBAC is abbreviated as ______________
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies