 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | DNS poisoning is very dangerous because it can extend its reach from one ___________ to another. | 
| A. | ISP server | 
| B. | DNS server | 
| C. | Linux server | 
| D. | Domain user | 
| Answer» C. Linux server | |
| 2. | ______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet. | 
| A. | DNS poisoning | 
| B. | DNS re-routing | 
| C. | DNS cracking | 
| D. | Domain link poisoning | 
| Answer» B. DNS re-routing | |
| 3. | A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records. | 
| A. | Zone file | 
| B. | Robot file | 
| C. | Bot file | 
| D. | DNS file | 
| Answer» B. Robot file | |
| 4. | Which of the following is not an example of DNS hijacking? | 
| A. | ISP DNS hijacking | 
| B. | DNS hijacking for phishing | 
| C. | DNS hijacking for pharming | 
| D. | HTTP-based DNS hacking | 
| Answer» E. | |
| 5. | The _______________ matches and maps to the user friendly domain name. | 
| A. | HTTP | 
| B. | DNS | 
| C. | WWW | 
| D. | ISP | 
| Answer» C. WWW | |
| 6. | _____________ can be attained by the use of malware or by changing the server’s settings. | 
| A. | DNS poisoning | 
| B. | DNS cracking | 
| C. | DNS hijacking | 
| D. | DNS redirecting | 
| Answer» D. DNS redirecting | |
| 7. | ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings. | 
| A. | DNS mal-functioning | 
| B. | DNS cracking | 
| C. | DNS redirecting | 
| D. | DNS hijacking | 
| Answer» E. | |
| 8. | WHICH_OF_THE_FOLLOWING_IS_NOT_AN_EXAMPLE_OF_DNS_HIJACKING??$ | 
| A. | ISP DNS hijacking | 
| B. | DNS hijacking for phishing | 
| C. | DNS hijacking for pharming | 
| D. | HTTP-based DNS hacking | 
| Answer» E. | |
| 9. | ______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of internet.$ | 
| A. | DNS poisoning | 
| B. | DNS re-routing | 
| C. | DNS cracking | 
| D. | Domain link poisoning | 
| Answer» B. DNS re-routing | |
| 10. | A________________is_essentially_a_text_file_residing_on_the_server_that_hosts_different_domain_containing_entries_for_dissimilar_resource_records.$ | 
| A. | Zone file | 
| B. | Robot file | 
| C. | Bot file | 
| D. | DNS file | 
| Answer» B. Robot file | |
| 11. | The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 12. | The ____________ Domain Name Server data will get spread to the ISPs & will be cached there. | 
| A. | working | 
| B. | compromised | 
| C. | corrupted | 
| D. | poisoned | 
| Answer» E. | |
| 13. | A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it. | 
| A. | Server data | 
| B. | Domain name | 
| C. | DNS cache | 
| D. | System file | 
| Answer» D. System file | |
| 14. | DNS_poisoning_is_very_dangerous_because_it_can_extend_its_reach_from_one_____________to_another. | 
| A. | ISP server | 
| B. | DNS server | 
| C. | Linux server | 
| D. | Domain user | 
| Answer» C. Linux server | |
| 15. | The _______________ matches and maps to the user friendly domain name? | 
| A. | HTTP | 
| B. | DNS | 
| C. | WWW | 
| D. | ISP | 
| Answer» C. WWW | |
| 16. | DNS trojans are used for performing a type of DNS hijacking. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 17. | There are _________ main types of DNS hijacking. | 
| A. | 4 | 
| B. | 2 | 
| C. | 3 | 
| D. | 5 | 
| Answer» C. 3 | |
| 18. | _____________ can be attained by the use of malware or by changing the server’s settings.$ | 
| A. | DNS poisoning | 
| B. | DNS cracking | 
| C. | DNS hijacking | 
| D. | DNS redirecting | 
| Answer» D. DNS redirecting | |
| 19. | ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.$ | 
| A. | DNS mal-functioning | 
| B. | DNS cracking | 
| C. | DNS redirecting | 
| D. | DNS hijacking | 
| Answer» E. | |
| 20. | Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain. | 
| A. | DNS names | 
| B. | HTTP setup | 
| C. | ISP setup | 
| D. | FTP-unsecured | 
| Answer» B. HTTP setup | |
| 21. | DNS stands for _____________ | 
| A. | Data Name System | 
| B. | Domain Name Server | 
| C. | Domain Name System | 
| D. | Domain’s Naming System | 
| Answer» D. Domain‚Äö√Ñ√∂‚àö√ë‚àö¬•s Naming System | |
| 22. | __________ is a naming system given to different computers which adapt to human-readable domain names. | 
| A. | HTTP | 
| B. | DNS | 
| C. | WWW | 
| D. | ISP | 
| Answer» C. WWW | |