MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase? |
| A. | Maltego |
| B. | NMAP |
| C. | Metasploit |
| D. | Nessus |
| Answer» D. Nessus | |
| 2. |
Which of the following is not done in gaining access phase? |
| A. | Tunnelling |
| B. | Buffer overflow |
| C. | Session hijacking |
| D. | Password cracking |
| Answer» B. Buffer overflow | |
| 3. |
In __________ phase the hacker exploits the network or system vulnerabilities. |
| A. | Scanning |
| B. | Maintaining access |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» E. | |
| 4. |
Which of the following comes after scanning phase in ethical hacking? |
| A. | Scanning |
| B. | Maintaining access |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» E. | |
| 5. |
Which of them is not a scanning tool? |
| A. | NMAP |
| B. | Nexpose |
| C. | Maltego |
| D. | Nessus |
| Answer» D. Nessus | |
| 6. |
Which of them does not comes under scanning methodologies? |
| A. | Vulnerability scanning |
| B. | Sweeping |
| C. | Port Scanning |
| D. | Google Dorks |
| Answer» E. | |
| 7. |
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking. |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» C. Gaining access | |
| 8. |
________ phase in ethical hacking is known as the pre-attack phase. |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» C. Gaining access | |
| 9. |
Which of the following is an example of passive reconnaissance? |
| A. | Telephonic calls to target victim |
| B. | Attacker as a fake person for Help Desk support |
| C. | Talk to the target user in person |
| D. | Search about target records in online people database |
| Answer» E. | |
| 10. |
Which of the following is an example of active reconnaissance? |
| A. | Searching public records |
| B. | Telephone calls as a help desk or fake customer care person |
| C. | Looking for the target’s details in the database |
| D. | Searching the target’s details in paper files |
| Answer» C. Looking for the target’s details in the database | |
| 11. |
There are ______ subtypes of reconnaissance. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 12. |
Which of the following is not a reconnaissance tool or technique for information gathering? |
| A. | Hping |
| B. | NMAP |
| C. | Google Dorks |
| D. | Nexpose |
| Answer» E. | |
| 13. |
____________ is the information gathering phase in ethical hacking from the target user. |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» B. Scanning | |
| 14. |
How many basic processes or steps are there in ethical hacking? |
| A. | 4 |
| B. | 5 |
| C. | 6 |
| D. | 7 |
| Answer» D. 7 | |