

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Collecting freely available information over the internet is an example of ____________ type of information gathering. |
A. | active |
B. | passive |
C. | active & passive |
D. | non-passive |
Answer» C. active & passive | |
2. |
Using spyware is an example of _________ type of information gathering. |
A. | active |
B. | passive |
C. | active & passive |
D. | non-passive |
Answer» B. passive | |
3. |
ARIN is abbreviated as _____________ |
A. | American Registry for Internet Numbers |
B. | American Registry for IP Numbers |
C. | All Registry for Internet Numbers |
D. | American Registry for IP Numbering |
Answer» B. American Registry for IP Numbers | |
4. |
You can attain a series of IP addresses allotted to a particular company using __________ site. |
A. | https://www.ipdata.org/ |
B. | https://www.arin.net/ |
C. | https://www.ipip.com/ |
D. | https://www.goipaddr.net/ |
Answer» C. https://www.ipip.com/ | |
5. |
Information about people is available people search sites. Which of them is an example of people data searching site? |
A. | people.com |
B. | indivinfo.org |
C. | intelius.com |
D. | peopleinfo.org |
Answer» D. peopleinfo.org | |
6. |
https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date. |
A. | True |
B. | False |
Answer» B. False | |
7. |
Spywares can be used to steal _______________ from the attacker’s browser. |
A. | browsing history |
B. | company details |
C. | plug-ins used |
D. | browser details |
Answer» B. company details | |
8. |
Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details. |
A. | True |
B. | False |
Answer» B. False | |
9. |
Which of them is not an information source over the internet for target attackers? |
A. | Whois |
B. | YouTube |
C. | Nslookup |
D. | Archive sites |
Answer» C. Nslookup | |
10. |
Which of the following is not a spot from where attackers seek information? |
A. | Domain name |
B. | IP address |
C. | System enumeration |
D. | Document files |
Answer» E. | |
11. |
_______________ is necessary to methodically & systematically ensure all pieces of information related to target. |
A. | Fingerprinting |
B. | 3D printing |
C. | Footprinting |
D. | Data printing |
Answer» D. Data printing | |
12. |
A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack. |
A. | security analyst |
B. | attacker |
C. | auditor |
D. | network engineer |
Answer» C. auditor | |
13. |
________________ is one of the 3 pre-attacking phase. |
A. | Fingerprinting |
B. | 3D printing |
C. | Footprinting |
D. | Data printing |
Answer» D. Data printing | |
14. |
How many types of footprinting are there? |
A. | 5 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» E. | |
15. |
________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network. |
A. | Fingerprinting |
B. | 3D printing |
C. | Footprinting |
D. | Data printing |
Answer» D. Data printing | |