

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
WHICH_OF_THEM_DO_NOT_COMES_UNDER_SCANNING_METHODOLOGIES??$ |
A. | Vulnerability scanning |
B. | Sweeping |
C. | Port Scanning |
D. | Google Dorks |
Answer» E. | |
2. |
Which of the following comes after scanning phase in ethical hacking?$ |
A. | Scanning |
B. | Maintaining access |
C. | Reconnaissance |
D. | Gaining access |
Answer» E. | |
3. |
Which_of_them_is_not_a_scanning_tool?$ |
A. | NMAP |
B. | Nexpose |
C. | Maltego |
D. | Nessus |
Answer» D. Nessus | |
4. |
Which of the below-mentioned penetration testing tool is popularly used in gaining access phase? |
A. | Maltego |
B. | NMAP |
C. | Metasploit |
D. | Nessus |
Answer» D. Nessus | |
5. |
Which of the following is not done in gaining access phase? |
A. | Tunnelling |
B. | Buffer overflow |
C. | Session hijacking |
D. | Password cracking |
Answer» B. Buffer overflow | |
6. |
In __________ phase the hacker exploits the network or system vulnerabilities. |
A. | Scanning |
B. | Maintaining access |
C. | Reconnaissance |
D. | Gaining access |
Answer» E. | |
7. |
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking? |
A. | Reconnaissance |
B. | Scanning |
C. | Gaining access |
D. | Maintaining access |
Answer» C. Gaining access | |
8. |
________ phase in ethical hacking is known as the pre-attack phase. |
A. | Reconnaissance |
B. | Scanning |
C. | Gaining access |
D. | Maintaining access |
Answer» C. Gaining access | |
9. |
Which of the following is an example of active reconnaissance? |
A. | Searching public records |
B. | Telephone calls as a help desk or fake customer care person |
C. | Looking for the target’s details in the database |
D. | Searching the target’s details in paper files |
Answer» C. Looking for the target‚Äö√Ñ√∂‚àö√ë‚àö¬•s details in the database | |
10. |
There are ______ subtypes of reconnaissance. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
11. |
Which of the following is not a reconnaissance tool or technique for information gathering? |
A. | Hping |
B. | NMAP |
C. | Google Dorks |
D. | Nexpose |
Answer» E. | |
12. |
____________ is the information gathering phase in ethical hacking from the target user. |
A. | Reconnaissance |
B. | Scanning |
C. | Gaining access |
D. | Maintaining access |
Answer» B. Scanning | |
13. |
How many basic processes or steps are there in ethical hacking? |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» D. 7 | |