 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | IDAPro is used as a _________________ in manual binary code analysis and also used a debugger. | 
| A. | PE & Resource Viewer | 
| B. | Debugger | 
| C. | Disassembler | 
| D. | Hex Editor | 
| Answer» D. Hex Editor | |
| 2. | PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software. | 
| A. | PE & Resource Viewer | 
| B. | Debugger | 
| C. | Disassembler | 
| D. | Hex Editor | 
| Answer» B. Debugger | |
| 3. | Hex editors permit programmers to inspect & alter binaries based on some software requirements. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 4. | Which of the following is not an actual Reverse Engineering tool? | 
| A. | Debugger | 
| B. | Disassembler | 
| C. | Text Editor | 
| D. | Hex Editor | 
| Answer» D. Hex Editor | |
| 5. | There are ______ types of reverse engineering methodologies. | 
| A. | 6 | 
| B. | 2 | 
| C. | 5 | 
| D. | 3 | 
| Answer» C. 5 | |
| 6. | Which of the following is not a disassembler tool? | 
| A. | IDA Pro | 
| B. | PE Explorer | 
| C. | Turbo C | 
| D. | W32DASM | 
| Answer» D. W32DASM | |
| 7. | De-compilation is not done for _______________ | 
| A. | Recovery of lost source code | 
| B. | Migration of assembly language | 
| C. | Determining the existence of malicious code in any app | 
| D. | Targeting users with stealing code | 
| Answer» E. | |
| 8. | ______________ comes under tools for reverse engineering (RE). | 
| A. | Reassembler | 
| B. | Compiler | 
| C. | Disassembler | 
| D. | Interpreter | 
| Answer» D. Interpreter | |
| 9. | ________________ is the opposite of assembler. | 
| A. | Reassembler | 
| B. | Disassembler | 
| C. | Compiler | 
| D. | Interpreter | 
| Answer» C. Compiler | |
| 10. | Which of the following is not a proper use of RE for ethical hackers? | 
| A. | Check for poorly designed protocols | 
| B. | Check for error conditions | 
| C. | Cracking for making paid apps free for use | 
| D. | Testing for boundary conditions | 
| Answer» D. Testing for boundary conditions | |
| 11. | Which of the following activity is a good aspect of reverse engineering in ethical hacking? | 
| A. | Cracking the trial version of the product to make it full-version | 
| B. | Removing the product key insertion step | 
| C. | Jumping the code for premium facilities | 
| D. | Determining the vulnerabilities in the product. | 
| Answer» E. | |
| 12. | RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media. | 
| A. | crackers | 
| B. | risk assessment team | 
| C. | auditors | 
| D. | surveillance monitoring team | 
| Answer» B. risk assessment team | |
| 13. | _____________ can be made functional to diverse aspects of software development & hardware improvement activities. | 
| A. | Reverse hacking | 
| B. | Cracking | 
| C. | Reverse engineering | 
| D. | Social engineering | 
| Answer» D. Social engineering | |
| 14. | ______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development. | 
| A. | Reverse hacking | 
| B. | Cracking | 
| C. | Social engineering | 
| D. | Reverse engineering | 
| Answer» E. | |