MCQOPTIONS
Saved Bookmarks
This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
_______________IS_COMPETENT_TO_RESTORE_CORRUPTED_EXCHANGE_SERVER_DATABASE_FILES_AS_WELL_AS_RECOVERING_UNAPPROACHABLE_MAILS_IN_MAILBOXES.?$ |
| A. | Outlook |
| B. | Nessus |
| C. | Mailbox Exchange Recovery |
| D. | Mail Exchange Recovery toolkit |
| Answer» D. Mail Exchange Recovery toolkit | |
| 2. |
__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.$ |
| A. | Cain and Abel |
| B. | Proofpoint |
| C. | Angry IP Scanner |
| D. | Ettercap |
| Answer» C. Angry IP Scanner | |
| 3. |
_________________helps_in_protecting_businesses_against_data_breaches_that_may_make_threats_to_cloud.$ |
| A. | Centrify |
| B. | Mailbox Exchange Recovery |
| C. | Nessus |
| D. | Dashline |
| Answer» B. Mailbox Exchange Recovery | |
| 4. |
______________helps_in_protecting_corporate_data,_communications_and_other_assets. |
| A. | Snort |
| B. | CipherCloud |
| C. | Burp Suit |
| D. | Wireshark |
| Answer» C. Burp Suit | |
| 5. |
________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location? |
| A. | EventLog Analyser |
| B. | NordVPN |
| C. | Wireshark |
| D. | PacketFilter Analyzer |
| Answer» B. NordVPN | |
| 6. |
__________ is a popular command-line packet analyser. |
| A. | Wireshark |
| B. | Snort |
| C. | Metasploit |
| D. | Tcpdump |
| Answer» E. | |
| 7. |
__________ is a debugger and exploration tool. |
| A. | Netdog |
| B. | Netcat |
| C. | Tcpdump |
| D. | BackTrack |
| Answer» C. Tcpdump | |
| 8. |
ToneLoc is abbreviated as __________ |
| A. | Tone Locking |
| B. | Tone Locator |
| C. | Tone Locker |
| D. | Tune Locator |
| Answer» D. Tune Locator | |
| 9. |
Network Stumbler is a Windows Wi-Fi monitoring tool. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
_____________ is a tool which can detect registry issues in an operating system. |
| A. | Network Stumbler |
| B. | Ettercap |
| C. | Maltego |
| D. | LANguard Network Security Scanner |
| Answer» E. | |
| 11. |
____________is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.$ |
| A. | Wireshark |
| B. | Nessus |
| C. | Snort |
| D. | WebInspect |
| Answer» C. Snort | |
| 12. |
Which of the following attach is not used by LC4 to recover Windows password? |
| A. | Brute-force attack |
| B. | Dictionary attack |
| C. | MiTM attack |
| D. | Hybrid attacks |
| Answer» D. Hybrid attacks | |