Explore topic-wise MCQs in Cyber Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

PING_SWEEP_IS_ALSO_KNOWN_AS_________________?$

A. ICMP Sweep
B. ICMP Call
C. IGMP Sweep
D. ICMP pinging
Answer» B. ICMP Call
2.

__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.$

A. Network
B. Port
C. Vulnerability
D. System
Answer» C. Vulnerability
3.

If any given address is running live, it will return an ICMP ECHO reply.$

A. True
B. False
Answer» B. False
4.

Which of them is not a standard scanning type or terminology?

A. Network
B. Port
C. Vulnerability
D. System
Answer» E.
5.

_____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.

A. Network
B. Port
C. Vulnerability
D. System
Answer» D. System
6.

____________ scanning is a procedure to identify active hosts on your network.

A. Network
B. Port
C. Vulnerability
D. System
Answer» B. Port
7.

A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts?

A. scan sweep
B. ping sweep
C. scan ping
D. host ping
Answer» C. scan ping
8.

Which of them do not comes under NETBIOS information?

A. Name of the system / PC
B. Workgroup name
C. MAC address
D. RAM space
Answer» E.
9.

________ attribute is used to tweak the ping timeout value.

A. -time
B. -t
C. -p
D. -tout
Answer» C. -p
10.

In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.

A. True
B. False
Answer» B. False
11.

ICMP scanning is used to scan _______________

A. open systems
B. live systems
C. malfunctioned systems
D. broken systems
Answer» C. malfunctioned systems
12.

Which of them is not a scanning methodology?

A. Check for live systems
B. Check for open ports
C. Identifying the malware in the system
D. Identifying of services
Answer» D. Identifying of services
13.

For discovering the OS running on the target system, the scanning has a specific term. What is it?

A. Footprinting
B. 3D Printing
C. Fingerprinting
D. screen-printing
Answer» D. screen-printing
14.

Which of the following is not an objective of scanning?

A. Detection of the live system running on network
B. Discovering the IP address of the target system
C. Discovering the services running on target system
D. Detection of spyware in a system
Answer» E.
15.

There are _______ types of scanning.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4