

MCQOPTIONS
Saved Bookmarks
This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
DNS poisoning is very dangerous because it can extend its reach from one ___________ to another. |
A. | ISP server |
B. | DNS server |
C. | Linux server |
D. | Domain user |
Answer» C. Linux server | |
2. |
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet. |
A. | DNS poisoning |
B. | DNS re-routing |
C. | DNS cracking |
D. | Domain link poisoning |
Answer» B. DNS re-routing | |
3. |
A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records. |
A. | Zone file |
B. | Robot file |
C. | Bot file |
D. | DNS file |
Answer» B. Robot file | |
4. |
Which of the following is not an example of DNS hijacking? |
A. | ISP DNS hijacking |
B. | DNS hijacking for phishing |
C. | DNS hijacking for pharming |
D. | HTTP-based DNS hacking |
Answer» E. | |
5. |
The _______________ matches and maps to the user friendly domain name. |
A. | HTTP |
B. | DNS |
C. | WWW |
D. | ISP |
Answer» C. WWW | |
6. |
_____________ can be attained by the use of malware or by changing the server’s settings. |
A. | DNS poisoning |
B. | DNS cracking |
C. | DNS hijacking |
D. | DNS redirecting |
Answer» D. DNS redirecting | |
7. |
______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings. |
A. | DNS mal-functioning |
B. | DNS cracking |
C. | DNS redirecting |
D. | DNS hijacking |
Answer» E. | |
8. |
WHICH_OF_THE_FOLLOWING_IS_NOT_AN_EXAMPLE_OF_DNS_HIJACKING??$ |
A. | ISP DNS hijacking |
B. | DNS hijacking for phishing |
C. | DNS hijacking for pharming |
D. | HTTP-based DNS hacking |
Answer» E. | |
9. |
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of internet.$ |
A. | DNS poisoning |
B. | DNS re-routing |
C. | DNS cracking |
D. | Domain link poisoning |
Answer» B. DNS re-routing | |
10. |
A________________is_essentially_a_text_file_residing_on_the_server_that_hosts_different_domain_containing_entries_for_dissimilar_resource_records.$ |
A. | Zone file |
B. | Robot file |
C. | Bot file |
D. | DNS file |
Answer» B. Robot file | |
11. |
The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship. |
A. | True |
B. | False |
Answer» B. False | |
12. |
The ____________ Domain Name Server data will get spread to the ISPs & will be cached there. |
A. | working |
B. | compromised |
C. | corrupted |
D. | poisoned |
Answer» E. | |
13. |
A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it. |
A. | Server data |
B. | Domain name |
C. | DNS cache |
D. | System file |
Answer» D. System file | |
14. |
DNS_poisoning_is_very_dangerous_because_it_can_extend_its_reach_from_one_____________to_another. |
A. | ISP server |
B. | DNS server |
C. | Linux server |
D. | Domain user |
Answer» C. Linux server | |
15. |
The _______________ matches and maps to the user friendly domain name? |
A. | HTTP |
B. | DNS |
C. | WWW |
D. | ISP |
Answer» C. WWW | |
16. |
DNS trojans are used for performing a type of DNS hijacking. |
A. | True |
B. | False |
Answer» B. False | |
17. |
There are _________ main types of DNS hijacking. |
A. | 4 |
B. | 2 |
C. | 3 |
D. | 5 |
Answer» C. 3 | |
18. |
_____________ can be attained by the use of malware or by changing the server’s settings.$ |
A. | DNS poisoning |
B. | DNS cracking |
C. | DNS hijacking |
D. | DNS redirecting |
Answer» D. DNS redirecting | |
19. |
______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.$ |
A. | DNS mal-functioning |
B. | DNS cracking |
C. | DNS redirecting |
D. | DNS hijacking |
Answer» E. | |
20. |
Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain. |
A. | DNS names |
B. | HTTP setup |
C. | ISP setup |
D. | FTP-unsecured |
Answer» B. HTTP setup | |
21. |
DNS stands for _____________ |
A. | Data Name System |
B. | Domain Name Server |
C. | Domain Name System |
D. | Domain’s Naming System |
Answer» D. Domain‚Äö√Ñ√∂‚àö√ë‚àö¬•s Naming System | |
22. |
__________ is a naming system given to different computers which adapt to human-readable domain names. |
A. | HTTP |
B. | DNS |
C. | WWW |
D. | ISP |
Answer» C. WWW | |