 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | PING_SWEEP_IS_ALSO_KNOWN_AS_________________?$ | 
| A. | ICMP Sweep | 
| B. | ICMP Call | 
| C. | IGMP Sweep | 
| D. | ICMP pinging | 
| Answer» B. ICMP Call | |
| 2. | __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.$ | 
| A. | Network | 
| B. | Port | 
| C. | Vulnerability | 
| D. | System | 
| Answer» C. Vulnerability | |
| 3. | If any given address is running live, it will return an ICMP ECHO reply.$ | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 4. | Which of them is not a standard scanning type or terminology? | 
| A. | Network | 
| B. | Port | 
| C. | Vulnerability | 
| D. | System | 
| Answer» E. | |
| 5. | _____________ scanning is an automatic process for identifying vulnerabilities of the system within a network. | 
| A. | Network | 
| B. | Port | 
| C. | Vulnerability | 
| D. | System | 
| Answer» D. System | |
| 6. | ____________ scanning is a procedure to identify active hosts on your network. | 
| A. | Network | 
| B. | Port | 
| C. | Vulnerability | 
| D. | System | 
| Answer» B. Port | |
| 7. | A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts? | 
| A. | scan sweep | 
| B. | ping sweep | 
| C. | scan ping | 
| D. | host ping | 
| Answer» C. scan ping | |
| 8. | Which of them do not comes under NETBIOS information? | 
| A. | Name of the system / PC | 
| B. | Workgroup name | 
| C. | MAC address | 
| D. | RAM space | 
| Answer» E. | |
| 9. | ________ attribute is used to tweak the ping timeout value. | 
| A. | -time | 
| B. | -t | 
| C. | -p | 
| D. | -tout | 
| Answer» C. -p | |
| 10. | In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 11. | ICMP scanning is used to scan _______________ | 
| A. | open systems | 
| B. | live systems | 
| C. | malfunctioned systems | 
| D. | broken systems | 
| Answer» C. malfunctioned systems | |
| 12. | Which of them is not a scanning methodology? | 
| A. | Check for live systems | 
| B. | Check for open ports | 
| C. | Identifying the malware in the system | 
| D. | Identifying of services | 
| Answer» D. Identifying of services | |
| 13. | For discovering the OS running on the target system, the scanning has a specific term. What is it? | 
| A. | Footprinting | 
| B. | 3D Printing | 
| C. | Fingerprinting | 
| D. | screen-printing | 
| Answer» D. screen-printing | |
| 14. | Which of the following is not an objective of scanning? | 
| A. | Detection of the live system running on network | 
| B. | Discovering the IP address of the target system | 
| C. | Discovering the services running on target system | 
| D. | Detection of spyware in a system | 
| Answer» E. | |
| 15. | There are _______ types of scanning. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» C. 4 | |