MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WHICH_OF_THEM_DO_NOT_COMES_UNDER_SCANNING_METHODOLOGIES??$ |
| A. | Vulnerability scanning |
| B. | Sweeping |
| C. | Port Scanning |
| D. | Google Dorks |
| Answer» E. | |
| 2. |
Which of the following comes after scanning phase in ethical hacking?$ |
| A. | Scanning |
| B. | Maintaining access |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» E. | |
| 3. |
Which_of_them_is_not_a_scanning_tool?$ |
| A. | NMAP |
| B. | Nexpose |
| C. | Maltego |
| D. | Nessus |
| Answer» D. Nessus | |
| 4. |
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase? |
| A. | Maltego |
| B. | NMAP |
| C. | Metasploit |
| D. | Nessus |
| Answer» D. Nessus | |
| 5. |
Which of the following is not done in gaining access phase? |
| A. | Tunnelling |
| B. | Buffer overflow |
| C. | Session hijacking |
| D. | Password cracking |
| Answer» B. Buffer overflow | |
| 6. |
In __________ phase the hacker exploits the network or system vulnerabilities. |
| A. | Scanning |
| B. | Maintaining access |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» E. | |
| 7. |
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking? |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» C. Gaining access | |
| 8. |
________ phase in ethical hacking is known as the pre-attack phase. |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» C. Gaining access | |
| 9. |
Which of the following is an example of active reconnaissance? |
| A. | Searching public records |
| B. | Telephone calls as a help desk or fake customer care person |
| C. | Looking for the target’s details in the database |
| D. | Searching the target’s details in paper files |
| Answer» C. Looking for the target‚Äö√Ñ√∂‚àö√ë‚àö¬•s details in the database | |
| 10. |
There are ______ subtypes of reconnaissance. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 11. |
Which of the following is not a reconnaissance tool or technique for information gathering? |
| A. | Hping |
| B. | NMAP |
| C. | Google Dorks |
| D. | Nexpose |
| Answer» E. | |
| 12. |
____________ is the information gathering phase in ethical hacking from the target user. |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» B. Scanning | |
| 13. |
How many basic processes or steps are there in ethical hacking? |
| A. | 4 |
| B. | 5 |
| C. | 6 |
| D. | 7 |
| Answer» D. 7 | |