

MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase? |
A. | Maltego |
B. | NMAP |
C. | Metasploit |
D. | Nessus |
Answer» D. Nessus | |
2. |
Which of the following is not done in gaining access phase? |
A. | Tunnelling |
B. | Buffer overflow |
C. | Session hijacking |
D. | Password cracking |
Answer» B. Buffer overflow | |
3. |
In __________ phase the hacker exploits the network or system vulnerabilities. |
A. | Scanning |
B. | Maintaining access |
C. | Reconnaissance |
D. | Gaining access |
Answer» E. | |
4. |
Which of the following comes after scanning phase in ethical hacking? |
A. | Scanning |
B. | Maintaining access |
C. | Reconnaissance |
D. | Gaining access |
Answer» E. | |
5. |
Which of them is not a scanning tool? |
A. | NMAP |
B. | Nexpose |
C. | Maltego |
D. | Nessus |
Answer» D. Nessus | |
6. |
Which of them does not comes under scanning methodologies? |
A. | Vulnerability scanning |
B. | Sweeping |
C. | Port Scanning |
D. | Google Dorks |
Answer» E. | |
7. |
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking. |
A. | Reconnaissance |
B. | Scanning |
C. | Gaining access |
D. | Maintaining access |
Answer» C. Gaining access | |
8. |
________ phase in ethical hacking is known as the pre-attack phase. |
A. | Reconnaissance |
B. | Scanning |
C. | Gaining access |
D. | Maintaining access |
Answer» C. Gaining access | |
9. |
Which of the following is an example of passive reconnaissance? |
A. | Telephonic calls to target victim |
B. | Attacker as a fake person for Help Desk support |
C. | Talk to the target user in person |
D. | Search about target records in online people database |
Answer» E. | |
10. |
Which of the following is an example of active reconnaissance? |
A. | Searching public records |
B. | Telephone calls as a help desk or fake customer care person |
C. | Looking for the target’s details in the database |
D. | Searching the target’s details in paper files |
Answer» C. Looking for the target’s details in the database | |
11. |
There are ______ subtypes of reconnaissance. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
12. |
Which of the following is not a reconnaissance tool or technique for information gathering? |
A. | Hping |
B. | NMAP |
C. | Google Dorks |
D. | Nexpose |
Answer» E. | |
13. |
____________ is the information gathering phase in ethical hacking from the target user. |
A. | Reconnaissance |
B. | Scanning |
C. | Gaining access |
D. | Maintaining access |
Answer» B. Scanning | |
14. |
How many basic processes or steps are there in ethical hacking? |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» D. 7 | |