

MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Ping sweep is also known as ________________ |
A. | ICMP sweep |
B. | SNMP sweep |
C. | SGNP sweep |
D. | SICMP sweep |
Answer» B. SNMP sweep | |
2. |
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts. |
A. | ping-based hacking |
B. | ping sweep |
C. | ping-range |
D. | pinging |
Answer» C. ping-range | |
3. |
To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server. |
A. | True |
B. | False |
Answer» B. False | |
4. |
______________ is a common tool used for doing OS fingerprinting. |
A. | Hping |
B. | Wireshark |
C. | Nmap |
D. | Nessus |
Answer» D. Nessus | |
5. |
TO_SECURE_YOUR_SYSTEM_FROM_SUCH_TYPE_OF_ATTACK,_YOU_HAVE_TO_HIDE_YOUR_SYSTEM_BEHIND_ANY_VPN_OR_PROXY_SERVER.?$ |
A. | True |
B. | False |
Answer» B. False | |
6. |
Ping sweep is also known as ________________$ |
A. | ICMP sweep |
B. | SNMP sweep |
C. | SGNP sweep |
D. | SICMP sweep |
Answer» B. SNMP sweep | |
7. |
A_______________is_a_network_scanning_practice_through_which_hackers_can_use_to_conclude_to_a_point_which_IP_address_from_a_list_of_IP_addresses_is_mapping_to_live_hosts.$ |
A. | ping-based hacking |
B. | ping sweep |
C. | ping-range |
D. | pinging |
Answer» C. ping-range | |
8. |
The configuration of DNS needs to be done in a secure way. |
A. | True |
B. | False |
Answer» B. False | |
9. |
Which of the following operations DNSenum cannot perform? |
A. | Perform reverse lookups |
B. | Get the host’s addresses |
C. | Get extra names and sub-domains through Google scraping |
D. | Get the admin password |
Answer» E. | |
10. |
___________________ is the method used to locate all the DNS-servers and their associated records for an organization. |
A. | DNS enumeration |
B. | DNS hacking |
C. | DNS cracking |
D. | DNS server hacking |
Answer» B. DNS hacking | |
11. |
The _____________ command is used on Linux for getting the DNS and host-related information. |
A. | dnslookup |
B. | lookup |
C. | nslookup |
D. | infolookup |
Answer» D. infolookup | |
12. |
______________ is a common tool used for doing OS fingerprinting? |
A. | Hping |
B. | Wireshark |
C. | Nmap |
D. | Nessus |
Answer» D. Nessus | |
13. |
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely. |
A. | True |
B. | False |
Answer» B. False | |
14. |
Which of the following do not comes under the important element of OS fingerprinting? |
A. | TTL |
B. | TOS |
C. | DF bits |
D. | Firewall |
Answer» E. | |
15. |
How many basic elements are there for OS fingerprinting? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
16. |
_______________________ is based on sniffer traces from the remote system. |
A. | Active fingerprinting |
B. | Passive fingerprinting |
C. | OS fingerprinting |
D. | Network fingerprinting |
Answer» C. OS fingerprinting | |
17. |
_______________________ is gained if you send especially skilled packets to a target machine. |
A. | Active fingerprinting |
B. | Passive fingerprinting |
C. | OS fingerprinting |
D. | Network fingerprinting |
Answer» B. Passive fingerprinting | |
18. |
How many types of fingerprinting are there in ethical hacking? |
A. | 5 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» E. | |
19. |
________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer. |
A. | Footprinting |
B. | Cyber-printing |
C. | OS fingerprinting |
D. | OS penetration testing |
Answer» D. OS penetration testing | |