 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which of the design phase is shown in below diagram? | 
| A. | Conceptual Design | 
| B. | Preliminary Design | 
| C. | First order sizing | 
| D. | Detail Design | 
| Answer» E. | |
| 2. | What is meant by the term Lofting? | 
| A. | Specifications and Requirements | 
| B. | Conceptual Drawing | 
| C. | Mathematical modelling of the skin | 
| D. | Trade study specifications | 
| Answer» D. Trade study specifications | |
| 3. | The main objective of the Preliminary stage is ______ | 
| A. | manufacture | 
| B. | fabrication | 
| C. | first order sizing | 
| D. | lofting | 
| Answer» E. | |
| 4. | The aim of the Preliminary Design stage is to make the company ready for the full scale development. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 5. | Which of these is not part of the Conceptual Design phase? | 
| A. | Specifications and Requirements | 
| B. | Conceptual Drawing | 
| C. | First weight estimation | 
| D. | Lofting | 
| Answer» E. | |
| 6. | Which of the following is the correct pair in chronological order? | 
| A. | Detail Design-Preliminary Design-Conceptual Design | 
| B. | Conceptual Design-Preliminary Design-Detail Design | 
| C. | Conceptual Design-Detail Design-Preliminary Design | 
| D. | Preliminary Design-Detail Design-Conceptual Design | 
| Answer» C. Conceptual Design-Detail Design-Preliminary Design | |
| 7. | Can we use similar design phases for an Airplane and for a Helicopter? | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 8. | Which of the following is a correct pair? | 
| A. | Testing major parts for fabrication – Conceptual Design | 
| B. | Testing major parts for fabrication – Detail Design | 
| C. | Testing major parts for fabrication – Preliminary Design | 
| D. | Testing major parts for fabrication – Initial Design | 
| Answer» C. Testing major parts for fabrication – Preliminary Design | |
| 9. | Which are the phases of Aircraft Design process? | 
| A. | Conceptual Design only | 
| B. | Conceptual Design, Preliminary Design and Detail Design | 
| C. | Only Preliminary Phase | 
| D. | Only Detail Design Phase | 
| Answer» B. Conceptual Design, Preliminary Design and Detail Design | |
| 10. | The requirements of an Aircraft will fall in ______ phase. | 
| A. | surface requirement | 
| B. | preliminary design | 
| C. | detail design | 
| D. | conceptual design | 
| Answer» E. | |
| 11. | The whole Design philosophy of an Aircraft is termed as _____ | 
| A. | design wheel | 
| B. | anatomy | 
| C. | design evaluation | 
| D. | sizing | 
| Answer» B. anatomy | |
| 12. | What is the initial phase of an Aircraft Design? | 
| A. | Conceptual Design | 
| B. | Preliminary Design | 
| C. | Detail Design | 
| D. | Sizing | 
| Answer» B. Preliminary Design | |
| 13. | In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication. | 
| A. | IP address, protocol | 
| B. | MAC address, protocol | 
| C. | IP address, IMEI number | 
| D. | MAC address, network model | 
| Answer» B. MAC address, protocol | |
| 14. | If any given address is running live, it will return an ICMP ECHO reply. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 15. | __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer. | 
| A. | Network | 
| B. | Port | 
| C. | Vulnerability | 
| D. | System | 
| Answer» C. Vulnerability | |
| 16. | A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts. | 
| A. | scan sweep | 
| B. | ping sweep | 
| C. | scan ping | 
| D. | host ping | 
| Answer» C. scan ping | |
| 17. | Ping sweep is also known as ________________ | 
| A. | ICMP Sweep | 
| B. | ICMP Call | 
| C. | IGMP Sweep | 
| D. | ICMP pinging | 
| Answer» B. ICMP Call | |
| 18. | ______________ is the unauthorized movement of data. | 
| A. | Data exfiltration | 
| B. | Data infiltration | 
| C. | Data cracking | 
| D. | Database hacking | 
| Answer» B. Data infiltration | |
| 19. | _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data. | 
| A. | Data loss prevention | 
| B. | Data loss measurement | 
| C. | Data stolen software | 
| D. | Data leak prevention | 
| Answer» B. Data loss measurement | |
| 20. | ____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups. | 
| A. | Competitive Intelligence gathering | 
| B. | Cognitive Intelligence gathering | 
| C. | Cyber Intelligence gathering | 
| D. | Competitors Info gathering | 
| Answer» B. Cognitive Intelligence gathering | |
| 21. | Which of the following is a site used for Competitive Intelligence gathering? | 
| A. | https://www.bidigital.gov/ | 
| B. | https://www.cig.com/ci/ | 
| C. | https://www.coginfo.com/ci/ | 
| D. | https://www.bidigital.com/ci/ | 
| Answer» E. | |
| 22. | Predict and analyze the tactics of competitors from data taken out from online data sources is a crime. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 23. | https://www.bidigital.com/ci/ is a website which is used for _________________ | 
| A. | Competitive Intelligence gathering | 
| B. | Cognitive Intelligence gathering | 
| C. | Cyber Intelligence gathering | 
| D. | Competitors Info gathering | 
| Answer» B. Cognitive Intelligence gathering | |
| 24. | Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 25. | https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 26. | You can attain a series of IP addresses allotted to a particular company using __________ site. | 
| A. | https://www.ipdata.org/ | 
| B. | https://www.arin.net/ | 
| C. | https://www.ipip.com/ | 
| D. | https://www.goipaddr.net/ | 
| Answer» C. https://www.ipip.com/ | |
| 27. | Which of the following is not a feature of Hping2 tool? | 
| A. | Firewall testing | 
| B. | Port scanning | 
| C. | Network testing | 
| D. | Server malware scanning | 
| Answer» E. | |
| 28. | Which of the following is not a valid scanning method? | 
| A. | Xmas Tree scan | 
| B. | SYN Stealth scan | 
| C. | Null Scan | 
| D. | Cloud scan | 
| Answer» E. | |
| 29. | ___________ is a command-line TCP/IP packet assembler and analyzer tool. | 
| A. | IGMP Ping | 
| B. | Hping2 | 
| C. | Nmap | 
| D. | Maltego | 
| Answer» C. Nmap | |
| 30. | _________________is quite an esoteric process for preventing session creation through a particular port. | 
| A. | Port knocking | 
| B. | Port cracking | 
| C. | Port hacking | 
| D. | Port-jacking | 
| Answer» B. Port cracking | |