Explore topic-wise MCQs in Cyber Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Collecting freely available information over the internet is an example of ____________ type of information gathering.

A. active
B. passive
C. active & passive
D. non-passive
Answer» C. active & passive
2.

Using spyware is an example of _________ type of information gathering.

A. active
B. passive
C. active & passive
D. non-passive
Answer» B. passive
3.

ARIN is abbreviated as _____________

A. American Registry for Internet Numbers
B. American Registry for IP Numbers
C. All Registry for Internet Numbers
D. American Registry for IP Numbering
Answer» B. American Registry for IP Numbers
4.

You can attain a series of IP addresses allotted to a particular company using __________ site.

A. https://www.ipdata.org/
B. https://www.arin.net/
C. https://www.ipip.com/
D. https://www.goipaddr.net/
Answer» C. https://www.ipip.com/
5.

Information about people is available people search sites. Which of them is an example of people data searching site?

A. people.com
B. indivinfo.org
C. intelius.com
D. peopleinfo.org
Answer» D. peopleinfo.org
6.

https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date.

A. True
B. False
Answer» B. False
7.

Spywares can be used to steal _______________ from the attacker’s browser.

A. browsing history
B. company details
C. plug-ins used
D. browser details
Answer» B. company details
8.

Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details.

A. True
B. False
Answer» B. False
9.

Which of them is not an information source over the internet for target attackers?

A. Whois
B. YouTube
C. Nslookup
D. Archive sites
Answer» C. Nslookup
10.

Which of the following is not a spot from where attackers seek information?

A. Domain name
B. IP address
C. System enumeration
D. Document files
Answer» E.
11.

_______________ is necessary to methodically & systematically ensure all pieces of information related to target.

A. Fingerprinting
B. 3D printing
C. Footprinting
D. Data printing
Answer» D. Data printing
12.

A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack.

A. security analyst
B. attacker
C. auditor
D. network engineer
Answer» C. auditor
13.

________________ is one of the 3 pre-attacking phase.

A. Fingerprinting
B. 3D printing
C. Footprinting
D. Data printing
Answer» D. Data printing
14.

How many types of footprinting are there?

A. 5
B. 4
C. 3
D. 2
Answer» E.
15.

________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.

A. Fingerprinting
B. 3D printing
C. Footprinting
D. Data printing
Answer» D. Data printing