 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | SPYWARES_CAN_BE_USED_TO_STEAL_________________FROM_THE_ATTACKER‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_BROWSER.?$# | 
| A. | browsing history | 
| B. | company details | 
| C. | plug-ins used | 
| D. | browser details | 
| Answer» B. company details | |
| 2. | Information about people is available people search sites. Which of them is an example of people data searching site?$ | 
| A. | people.com | 
| B. | indivinfo.org | 
| C. | intelius.com | 
| D. | peopleinfo.org | 
| Answer» D. peopleinfo.org | |
| 3. | https://archive.org_is_a_popular_site_where_one_can_enter_a_domain_name_in_its_search_box_for_finding_out_how_the_site_was_looking_at_a_given_date.$ | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 4. | Collecting freely available information over the internet is an example of ____________ type of information gathering. | 
| A. | active | 
| B. | passive | 
| C. | active & passive | 
| D. | non-passive | 
| Answer» C. active & passive | |
| 5. | Using spyware is an example of _________ type of information gathering. | 
| A. | active | 
| B. | passive | 
| C. | active & passive | 
| D. | non-passive | 
| Answer» B. passive | |
| 6. | ARIN is abbreviated as _____________ | 
| A. | American Registry for Internet Numbers | 
| B. | American Registry for IP Numbers | 
| C. | All Registry for Internet Numbers | 
| D. | American Registry for IP Numbering | 
| Answer» B. American Registry for IP Numbers | |
| 7. | You_can_attain_a_series_of_IP_addresses_allotted_to_a_particular_company_using____________site. | 
| A. | https://www.ipdata.org/ | 
| B. | https://www.arin.net/ | 
| C. | https://www.ipip.com/ | 
| D. | https://www.goipaddr.net/ | 
| Answer» C. https://www.ipip.com/ | |
| 8. | Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details? | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 9. | Which of them is not an information source over the internet for target attackers? | 
| A. | Whois | 
| B. | YouTube | 
| C. | Nslookup | 
| D. | Archive sites | 
| Answer» C. Nslookup | |
| 10. | Which of the following is not a spot from where attackers seek information? | 
| A. | Domain name | 
| B. | IP address | 
| C. | System enumeration | 
| D. | Document files | 
| Answer» E. | |
| 11. | _______________ is necessary to methodically & systematically ensure all pieces of information related to target. | 
| A. | Fingerprinting | 
| B. | 3D printing | 
| C. | Footprinting | 
| D. | Data printing | 
| Answer» D. Data printing | |
| 12. | A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack. | 
| A. | security analyst | 
| B. | attacker | 
| C. | auditor | 
| D. | network engineer | 
| Answer» C. auditor | |
| 13. | ________________ is one of the 3 pre-attacking phase. | 
| A. | Fingerprinting | 
| B. | 3D printing | 
| C. | Footprinting | 
| D. | Data printing | 
| Answer» D. Data printing | |
| 14. | How many types of footprinting are there? | 
| A. | 5 | 
| B. | 4 | 
| C. | 3 | 
| D. | 2 | 
| Answer» E. | |
| 15. | ________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network. | 
| A. | Fingerprinting | 
| B. | 3D printing | 
| C. | Footprinting | 
| D. | Data printing | 
| Answer» D. Data printing | |