MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WHICH_OF_THE_FOLLOWING_IS_NOT_A_DISASSEMBLER_TOOL??$ |
| A. | IDA Pro |
| B. | PE Explorer |
| C. | Turbo C |
| D. | W32DASM |
| Answer» D. W32DASM | |
| 2. |
Which of the following is not an actual Reverse Engineering tool?$ |
| A. | Debugger |
| B. | Disassembler |
| C. | Text Editor |
| D. | Hex Editor |
| Answer» D. Hex Editor | |
| 3. |
There are ______ types of reverse engineering methodologies.$ |
| A. | 6 |
| B. | 2 |
| C. | 5 |
| D. | 3 |
| Answer» C. 5 | |
| 4. |
IDAPro is used as a _________________ in manual binary code analysis and also used a debugger. |
| A. | PE & Resource Viewer |
| B. | Debugger |
| C. | Disassembler |
| D. | Hex Editor |
| Answer» D. Hex Editor | |
| 5. |
PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software. |
| A. | PE & Resource Viewer |
| B. | Debugger |
| C. | Disassembler |
| D. | Hex Editor |
| Answer» B. Debugger | |
| 6. |
Hex editors permit programmers to inspect & alter binaries based on some software requirements. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
De-compilation is not done for ______________? |
| A. | Recovery of lost source code |
| B. | Migration of assembly language |
| C. | Determining the existence of malicious code in any app |
| D. | Targeting users with stealing code |
| Answer» E. | |
| 8. |
______________ comes under tools for reverse engineering (RE)? |
| A. | Reassembler |
| B. | Compiler |
| C. | Disassembler |
| D. | Interpreter |
| Answer» D. Interpreter | |
| 9. |
________________ is the opposite of assembler. |
| A. | Reassembler |
| B. | Disassembler |
| C. | Compiler |
| D. | Interpreter |
| Answer» C. Compiler | |
| 10. |
Which of the following is not a proper use of RE for ethical hackers? |
| A. | Check for poorly designed protocols |
| B. | Check for error conditions |
| C. | Cracking for making paid apps free for use |
| D. | Testing for boundary conditions |
| Answer» D. Testing for boundary conditions | |
| 11. |
Which of the following activity is a good aspect of reverse engineering in ethical hacking? |
| A. | Cracking the trial version of the product to make it full-version |
| B. | Removing the product key insertion step |
| C. | Jumping the code for premium facilities |
| D. | Determining the vulnerabilities in the product. |
| Answer» E. | |
| 12. |
RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media. |
| A. | crackers |
| B. | risk assessment team |
| C. | auditors |
| D. | surveillance monitoring team |
| Answer» B. risk assessment team | |
| 13. |
_____________ can be made functional to diverse aspects of software development & hardware improvement activities. |
| A. | Reverse hacking |
| B. | Cracking |
| C. | Reverse engineering |
| D. | Social engineering |
| Answer» D. Social engineering | |
| 14. |
______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development. |
| A. | Reverse hacking |
| B. | Cracking |
| C. | Social engineering |
| D. | Reverse engineering |
| Answer» E. | |