

MCQOPTIONS
Saved Bookmarks
This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the design phase is shown in below diagram? |
A. | Conceptual Design |
B. | Preliminary Design |
C. | First order sizing |
D. | Detail Design |
Answer» E. | |
2. |
What is meant by the term Lofting? |
A. | Specifications and Requirements |
B. | Conceptual Drawing |
C. | Mathematical modelling of the skin |
D. | Trade study specifications |
Answer» D. Trade study specifications | |
3. |
The main objective of the Preliminary stage is ______ |
A. | manufacture |
B. | fabrication |
C. | first order sizing |
D. | lofting |
Answer» E. | |
4. |
The aim of the Preliminary Design stage is to make the company ready for the full scale development. |
A. | True |
B. | False |
Answer» B. False | |
5. |
Which of these is not part of the Conceptual Design phase? |
A. | Specifications and Requirements |
B. | Conceptual Drawing |
C. | First weight estimation |
D. | Lofting |
Answer» E. | |
6. |
Which of the following is the correct pair in chronological order? |
A. | Detail Design-Preliminary Design-Conceptual Design |
B. | Conceptual Design-Preliminary Design-Detail Design |
C. | Conceptual Design-Detail Design-Preliminary Design |
D. | Preliminary Design-Detail Design-Conceptual Design |
Answer» C. Conceptual Design-Detail Design-Preliminary Design | |
7. |
Can we use similar design phases for an Airplane and for a Helicopter? |
A. | True |
B. | False |
Answer» B. False | |
8. |
Which of the following is a correct pair? |
A. | Testing major parts for fabrication – Conceptual Design |
B. | Testing major parts for fabrication – Detail Design |
C. | Testing major parts for fabrication – Preliminary Design |
D. | Testing major parts for fabrication – Initial Design |
Answer» C. Testing major parts for fabrication – Preliminary Design | |
9. |
Which are the phases of Aircraft Design process? |
A. | Conceptual Design only |
B. | Conceptual Design, Preliminary Design and Detail Design |
C. | Only Preliminary Phase |
D. | Only Detail Design Phase |
Answer» B. Conceptual Design, Preliminary Design and Detail Design | |
10. |
The requirements of an Aircraft will fall in ______ phase. |
A. | surface requirement |
B. | preliminary design |
C. | detail design |
D. | conceptual design |
Answer» E. | |
11. |
The whole Design philosophy of an Aircraft is termed as _____ |
A. | design wheel |
B. | anatomy |
C. | design evaluation |
D. | sizing |
Answer» B. anatomy | |
12. |
What is the initial phase of an Aircraft Design? |
A. | Conceptual Design |
B. | Preliminary Design |
C. | Detail Design |
D. | Sizing |
Answer» B. Preliminary Design | |
13. |
In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication. |
A. | IP address, protocol |
B. | MAC address, protocol |
C. | IP address, IMEI number |
D. | MAC address, network model |
Answer» B. MAC address, protocol | |
14. |
If any given address is running live, it will return an ICMP ECHO reply. |
A. | True |
B. | False |
Answer» B. False | |
15. |
__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer. |
A. | Network |
B. | Port |
C. | Vulnerability |
D. | System |
Answer» C. Vulnerability | |
16. |
A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts. |
A. | scan sweep |
B. | ping sweep |
C. | scan ping |
D. | host ping |
Answer» C. scan ping | |
17. |
Ping sweep is also known as ________________ |
A. | ICMP Sweep |
B. | ICMP Call |
C. | IGMP Sweep |
D. | ICMP pinging |
Answer» B. ICMP Call | |
18. |
______________ is the unauthorized movement of data. |
A. | Data exfiltration |
B. | Data infiltration |
C. | Data cracking |
D. | Database hacking |
Answer» B. Data infiltration | |
19. |
_____________ focuses on the detection & prevention of sensitive data exfiltration and lost data. |
A. | Data loss prevention |
B. | Data loss measurement |
C. | Data stolen software |
D. | Data leak prevention |
Answer» B. Data loss measurement | |
20. |
____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups. |
A. | Competitive Intelligence gathering |
B. | Cognitive Intelligence gathering |
C. | Cyber Intelligence gathering |
D. | Competitors Info gathering |
Answer» B. Cognitive Intelligence gathering | |
21. |
Which of the following is a site used for Competitive Intelligence gathering? |
A. | https://www.bidigital.gov/ |
B. | https://www.cig.com/ci/ |
C. | https://www.coginfo.com/ci/ |
D. | https://www.bidigital.com/ci/ |
Answer» E. | |
22. |
Predict and analyze the tactics of competitors from data taken out from online data sources is a crime. |
A. | True |
B. | False |
Answer» C. | |
23. |
https://www.bidigital.com/ci/ is a website which is used for _________________ |
A. | Competitive Intelligence gathering |
B. | Cognitive Intelligence gathering |
C. | Cyber Intelligence gathering |
D. | Competitors Info gathering |
Answer» B. Cognitive Intelligence gathering | |
24. |
Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details. |
A. | True |
B. | False |
Answer» B. False | |
25. |
https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date. |
A. | True |
B. | False |
Answer» B. False | |
26. |
You can attain a series of IP addresses allotted to a particular company using __________ site. |
A. | https://www.ipdata.org/ |
B. | https://www.arin.net/ |
C. | https://www.ipip.com/ |
D. | https://www.goipaddr.net/ |
Answer» C. https://www.ipip.com/ | |
27. |
Which of the following is not a feature of Hping2 tool? |
A. | Firewall testing |
B. | Port scanning |
C. | Network testing |
D. | Server malware scanning |
Answer» E. | |
28. |
Which of the following is not a valid scanning method? |
A. | Xmas Tree scan |
B. | SYN Stealth scan |
C. | Null Scan |
D. | Cloud scan |
Answer» E. | |
29. |
___________ is a command-line TCP/IP packet assembler and analyzer tool. |
A. | IGMP Ping |
B. | Hping2 |
C. | Nmap |
D. | Maltego |
Answer» C. Nmap | |
30. |
_________________is quite an esoteric process for preventing session creation through a particular port. |
A. | Port knocking |
B. | Port cracking |
C. | Port hacking |
D. | Port-jacking |
Answer» B. Port cracking | |