

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
SPYWARES_CAN_BE_USED_TO_STEAL_________________FROM_THE_ATTACKER‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_BROWSER.?$# |
A. | browsing history |
B. | company details |
C. | plug-ins used |
D. | browser details |
Answer» B. company details | |
2. |
Information about people is available people search sites. Which of them is an example of people data searching site?$ |
A. | people.com |
B. | indivinfo.org |
C. | intelius.com |
D. | peopleinfo.org |
Answer» D. peopleinfo.org | |
3. |
https://archive.org_is_a_popular_site_where_one_can_enter_a_domain_name_in_its_search_box_for_finding_out_how_the_site_was_looking_at_a_given_date.$ |
A. | True |
B. | False |
Answer» B. False | |
4. |
Collecting freely available information over the internet is an example of ____________ type of information gathering. |
A. | active |
B. | passive |
C. | active & passive |
D. | non-passive |
Answer» C. active & passive | |
5. |
Using spyware is an example of _________ type of information gathering. |
A. | active |
B. | passive |
C. | active & passive |
D. | non-passive |
Answer» B. passive | |
6. |
ARIN is abbreviated as _____________ |
A. | American Registry for Internet Numbers |
B. | American Registry for IP Numbers |
C. | All Registry for Internet Numbers |
D. | American Registry for IP Numbering |
Answer» B. American Registry for IP Numbers | |
7. |
You_can_attain_a_series_of_IP_addresses_allotted_to_a_particular_company_using____________site. |
A. | https://www.ipdata.org/ |
B. | https://www.arin.net/ |
C. | https://www.ipip.com/ |
D. | https://www.goipaddr.net/ |
Answer» C. https://www.ipip.com/ | |
8. |
Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details? |
A. | True |
B. | False |
Answer» B. False | |
9. |
Which of them is not an information source over the internet for target attackers? |
A. | Whois |
B. | YouTube |
C. | Nslookup |
D. | Archive sites |
Answer» C. Nslookup | |
10. |
Which of the following is not a spot from where attackers seek information? |
A. | Domain name |
B. | IP address |
C. | System enumeration |
D. | Document files |
Answer» E. | |
11. |
_______________ is necessary to methodically & systematically ensure all pieces of information related to target. |
A. | Fingerprinting |
B. | 3D printing |
C. | Footprinting |
D. | Data printing |
Answer» D. Data printing | |
12. |
A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack. |
A. | security analyst |
B. | attacker |
C. | auditor |
D. | network engineer |
Answer» C. auditor | |
13. |
________________ is one of the 3 pre-attacking phase. |
A. | Fingerprinting |
B. | 3D printing |
C. | Footprinting |
D. | Data printing |
Answer» D. Data printing | |
14. |
How many types of footprinting are there? |
A. | 5 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» E. | |
15. |
________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network. |
A. | Fingerprinting |
B. | 3D printing |
C. | Footprinting |
D. | Data printing |
Answer» D. Data printing | |