

MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of them is not a standard scanning type or terminology? |
A. | Network |
B. | Port |
C. | Vulnerability |
D. | System |
Answer» E. | |
2. |
_____________ scanning is an automatic process for identifying vulnerabilities of the system within a network. |
A. | Network |
B. | Port |
C. | Vulnerability |
D. | System |
Answer» D. System | |
3. |
____________ scanning is a procedure to identify active hosts on your network. |
A. | Network |
B. | Port |
C. | Vulnerability |
D. | System |
Answer» B. Port | |
4. |
__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer. |
A. | Network |
B. | Port |
C. | Vulnerability |
D. | System |
Answer» C. Vulnerability | |
5. |
If any given address is running live, it will return an ICMP ECHO reply. |
A. | True |
B. | False |
Answer» B. False | |
6. |
A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts. |
A. | scan sweep |
B. | ping sweep |
C. | scan ping |
D. | host ping |
Answer» C. scan ping | |
7. |
Which of them do not comes under NETBIOS information? |
A. | Name of the system / PC |
B. | Workgroup name |
C. | MAC address |
D. | RAM space |
Answer» E. | |
8. |
________ attribute is used to tweak the ping timeout value. |
A. | -time |
B. | -t |
C. | -p |
D. | -tout |
Answer» C. -p | |
9. |
In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network. |
A. | True |
B. | False |
Answer» B. False | |
10. |
ICMP scanning is used to scan _______________ |
A. | open systems |
B. | live systems |
C. | malfunctioned systems |
D. | broken systems |
Answer» C. malfunctioned systems | |
11. |
Which of them is not a scanning methodology? |
A. | Check for live systems |
B. | Check for open ports |
C. | Identifying the malware in the system |
D. | Identifying of services |
Answer» D. Identifying of services | |
12. |
For discovering the OS running on the target system, the scanning has a specific term. What is it? |
A. | Footprinting |
B. | 3D Printing |
C. | Fingerprinting |
D. | screen-printing |
Answer» D. screen-printing | |
13. |
Which of the following is not an objective of scanning? |
A. | Detection of the live system running on network |
B. | Discovering the IP address of the target system |
C. | Discovering the services running on target system |
D. | Detection of spyware in a system |
Answer» E. | |
14. |
There are _______ types of scanning. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» C. 4 | |