Explore topic-wise MCQs in Cyber Security.

This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Ping sweep is also known as ________________

A. ICMP sweep
B. SNMP sweep
C. SGNP sweep
D. SICMP sweep
Answer» B. SNMP sweep
2.

A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.

A. ping-based hacking
B. ping sweep
C. ping-range
D. pinging
Answer» C. ping-range
3.

To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server.

A. True
B. False
Answer» B. False
4.

______________ is a common tool used for doing OS fingerprinting.

A. Hping
B. Wireshark
C. Nmap
D. Nessus
Answer» D. Nessus
5.

TO_SECURE_YOUR_SYSTEM_FROM_SUCH_TYPE_OF_ATTACK,_YOU_HAVE_TO_HIDE_YOUR_SYSTEM_BEHIND_ANY_VPN_OR_PROXY_SERVER.?$

A. True
B. False
Answer» B. False
6.

Ping sweep is also known as ________________$

A. ICMP sweep
B. SNMP sweep
C. SGNP sweep
D. SICMP sweep
Answer» B. SNMP sweep
7.

A_______________is_a_network_scanning_practice_through_which_hackers_can_use_to_conclude_to_a_point_which_IP_address_from_a_list_of_IP_addresses_is_mapping_to_live_hosts.$

A. ping-based hacking
B. ping sweep
C. ping-range
D. pinging
Answer» C. ping-range
8.

The configuration of DNS needs to be done in a secure way.

A. True
B. False
Answer» B. False
9.

Which of the following operations DNSenum cannot perform?

A. Perform reverse lookups
B. Get the host’s addresses
C. Get extra names and sub-domains through Google scraping
D. Get the admin password
Answer» E.
10.

___________________ is the method used to locate all the DNS-servers and their associated records for an organization.

A. DNS enumeration
B. DNS hacking
C. DNS cracking
D. DNS server hacking
Answer» B. DNS hacking
11.

The _____________ command is used on Linux for getting the DNS and host-related information.

A. dnslookup
B. lookup
C. nslookup
D. infolookup
Answer» D. infolookup
12.

______________ is a common tool used for doing OS fingerprinting?

A. Hping
B. Wireshark
C. Nmap
D. Nessus
Answer» D. Nessus
13.

By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.

A. True
B. False
Answer» B. False
14.

Which of the following do not comes under the important element of OS fingerprinting?

A. TTL
B. TOS
C. DF bits
D. Firewall
Answer» E.
15.

How many basic elements are there for OS fingerprinting?

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
16.

_______________________ is based on sniffer traces from the remote system.

A. Active fingerprinting
B. Passive fingerprinting
C. OS fingerprinting
D. Network fingerprinting
Answer» C. OS fingerprinting
17.

_______________________ is gained if you send especially skilled packets to a target machine.

A. Active fingerprinting
B. Passive fingerprinting
C. OS fingerprinting
D. Network fingerprinting
Answer» B. Passive fingerprinting
18.

How many types of fingerprinting are there in ethical hacking?

A. 5
B. 4
C. 3
D. 2
Answer» E.
19.

________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.

A. Footprinting
B. Cyber-printing
C. OS fingerprinting
D. OS penetration testing
Answer» D. OS penetration testing