MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Ping sweep is also known as ________________ |
| A. | ICMP sweep |
| B. | SNMP sweep |
| C. | SGNP sweep |
| D. | SICMP sweep |
| Answer» B. SNMP sweep | |
| 2. |
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts. |
| A. | ping-based hacking |
| B. | ping sweep |
| C. | ping-range |
| D. | pinging |
| Answer» C. ping-range | |
| 3. |
To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
______________ is a common tool used for doing OS fingerprinting. |
| A. | Hping |
| B. | Wireshark |
| C. | Nmap |
| D. | Nessus |
| Answer» D. Nessus | |
| 5. |
TO_SECURE_YOUR_SYSTEM_FROM_SUCH_TYPE_OF_ATTACK,_YOU_HAVE_TO_HIDE_YOUR_SYSTEM_BEHIND_ANY_VPN_OR_PROXY_SERVER.?$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 6. |
Ping sweep is also known as ________________$ |
| A. | ICMP sweep |
| B. | SNMP sweep |
| C. | SGNP sweep |
| D. | SICMP sweep |
| Answer» B. SNMP sweep | |
| 7. |
A_______________is_a_network_scanning_practice_through_which_hackers_can_use_to_conclude_to_a_point_which_IP_address_from_a_list_of_IP_addresses_is_mapping_to_live_hosts.$ |
| A. | ping-based hacking |
| B. | ping sweep |
| C. | ping-range |
| D. | pinging |
| Answer» C. ping-range | |
| 8. |
The configuration of DNS needs to be done in a secure way. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
Which of the following operations DNSenum cannot perform? |
| A. | Perform reverse lookups |
| B. | Get the host’s addresses |
| C. | Get extra names and sub-domains through Google scraping |
| D. | Get the admin password |
| Answer» E. | |
| 10. |
___________________ is the method used to locate all the DNS-servers and their associated records for an organization. |
| A. | DNS enumeration |
| B. | DNS hacking |
| C. | DNS cracking |
| D. | DNS server hacking |
| Answer» B. DNS hacking | |
| 11. |
The _____________ command is used on Linux for getting the DNS and host-related information. |
| A. | dnslookup |
| B. | lookup |
| C. | nslookup |
| D. | infolookup |
| Answer» D. infolookup | |
| 12. |
______________ is a common tool used for doing OS fingerprinting? |
| A. | Hping |
| B. | Wireshark |
| C. | Nmap |
| D. | Nessus |
| Answer» D. Nessus | |
| 13. |
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 14. |
Which of the following do not comes under the important element of OS fingerprinting? |
| A. | TTL |
| B. | TOS |
| C. | DF bits |
| D. | Firewall |
| Answer» E. | |
| 15. |
How many basic elements are there for OS fingerprinting? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 16. |
_______________________ is based on sniffer traces from the remote system. |
| A. | Active fingerprinting |
| B. | Passive fingerprinting |
| C. | OS fingerprinting |
| D. | Network fingerprinting |
| Answer» C. OS fingerprinting | |
| 17. |
_______________________ is gained if you send especially skilled packets to a target machine. |
| A. | Active fingerprinting |
| B. | Passive fingerprinting |
| C. | OS fingerprinting |
| D. | Network fingerprinting |
| Answer» B. Passive fingerprinting | |
| 18. |
How many types of fingerprinting are there in ethical hacking? |
| A. | 5 |
| B. | 4 |
| C. | 3 |
| D. | 2 |
| Answer» E. | |
| 19. |
________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer. |
| A. | Footprinting |
| B. | Cyber-printing |
| C. | OS fingerprinting |
| D. | OS penetration testing |
| Answer» D. OS penetration testing | |