Explore topic-wise MCQs in Cyber Security.

This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

WHICH_OF_THEM_DO_NOT_COMES_UNDER_SCANNING_METHODOLOGIES??$

A. Vulnerability scanning
B. Sweeping
C. Port Scanning
D. Google Dorks
Answer» E.
2.

Which of the following comes after scanning phase in ethical hacking?$

A. Scanning
B. Maintaining access
C. Reconnaissance
D. Gaining access
Answer» E.
3.

Which_of_them_is_not_a_scanning_tool?$

A. NMAP
B. Nexpose
C. Maltego
D. Nessus
Answer» D. Nessus
4.

Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?

A. Maltego
B. NMAP
C. Metasploit
D. Nessus
Answer» D. Nessus
5.

Which of the following is not done in gaining access phase?

A. Tunnelling
B. Buffer overflow
C. Session hijacking
D. Password cracking
Answer» B. Buffer overflow
6.

In __________ phase the hacker exploits the network or system vulnerabilities.

A. Scanning
B. Maintaining access
C. Reconnaissance
D. Gaining access
Answer» E.
7.

While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking?

A. Reconnaissance
B. Scanning
C. Gaining access
D. Maintaining access
Answer» C. Gaining access
8.

________ phase in ethical hacking is known as the pre-attack phase.

A. Reconnaissance
B. Scanning
C. Gaining access
D. Maintaining access
Answer» C. Gaining access
9.

Which of the following is an example of active reconnaissance?

A. Searching public records
B. Telephone calls as a help desk or fake customer care person
C. Looking for the target’s details in the database
D. Searching the target’s details in paper files
Answer» C. Looking for the target‚Äö√Ñ√∂‚àö√ë‚àö¬•s details in the database
10.

There are ______ subtypes of reconnaissance.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
11.

Which of the following is not a reconnaissance tool or technique for information gathering?

A. Hping
B. NMAP
C. Google Dorks
D. Nexpose
Answer» E.
12.

____________ is the information gathering phase in ethical hacking from the target user.

A. Reconnaissance
B. Scanning
C. Gaining access
D. Maintaining access
Answer» B. Scanning
13.

How many basic processes or steps are there in ethical hacking?

A. 4
B. 5
C. 6
D. 7
Answer» D. 7