MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is not an appropriate countermeasure for web server hacking? |
| A. | Patch updates need to be done regularly |
| B. | Not to use default configurations |
| C. | Use IDS and firewalls with signature updates |
| D. | Use low-speed internet |
| Answer» E. | |
| 2. |
CleanIISLog is not a hacking tool. |
| A. | True |
| B. | False |
| Answer» C. | |
| 3. |
______________ tool clears the log entries in the IIS log files filtered by an IP address. |
| A. | CleanIISLoging |
| B. | CleanLogger |
| C. | CleanIISLog |
| D. | ClearIISLog |
| Answer» D. ClearIISLog | |
| 4. |
CLEANIISLOG_IS_NOT_A_HACKING_TOOL.?$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 5. |
_______________TOOL_CLEARS_THE_LOG_ENTRIES_IN_THE_IIS_LOG_FILES_FILTERED_BY_AN_IP_ADDRESS.?$ |
| A. | CleanIISLoging |
| B. | CleanLogger |
| C. | CleanIISLog |
| D. | ClearIISLog |
| Answer» D. ClearIISLog | |
| 6. |
Which of the following is not an appropriate countermeasure for web server hacking?$ |
| A. | Patch updates need to be done regularly |
| B. | Not to use default configurations |
| C. | Use IDS and firewalls with signature updates |
| D. | Use low-speed internet |
| Answer» E. | |
| 7. |
Which of the following is not a web server attack type? |
| A. | DOS attack |
| B. | Website Defacement using SQLi |
| C. | Directory Traversal |
| D. | Password guessing |
| Answer» E. | |
| 8. |
____________ logs all the visits in log files which is located at \logfiles. |
| A. | IIS |
| B. | Microsoft Server |
| C. | Linux |
| D. | IAS |
| Answer» B. Microsoft Server | |
| 9. |
____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC. |
| A. | Spyware |
| B. | ASP Trojan |
| C. | Web ransomware |
| D. | Stuxnet |
| Answer» C. Web ransomware | |
| 10. |
IIS stands for __________________ |
| A. | Interconnected Information Server |
| B. | Interconnected Information Services |
| C. | Internet Information Server |
| D. | Internet Information Services |
| Answer» E. | |
| 11. |
_________ is one of the most widely used web server platforms. |
| A. | IIS |
| B. | IAS |
| C. | ISS |
| D. | AIS |
| Answer» B. IAS | |
| 12. |
Which of the following is not an appropriate method of defacing web server? |
| A. | Fetching credentials through MiTM |
| B. | Brute-forcing Admin Password |
| C. | IP address spoofing |
| D. | DNS Attack through cache poisoning |
| Answer» D. DNS Attack through cache poisoning | |
| 13. |
Which of the following is not an appropriate way to compromise web servers? |
| A. | Misconfiguration in OS |
| B. | Using network vulnerabilities |
| C. | Misconfiguration in networks |
| D. | Bugs in OS which allow commands to run on web servers |
| Answer» C. Misconfiguration in networks | |