

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is not an appropriate countermeasure for web server hacking? |
A. | Patch updates need to be done regularly |
B. | Not to use default configurations |
C. | Use IDS and firewalls with signature updates |
D. | Use low-speed internet |
Answer» E. | |
2. |
CleanIISLog is not a hacking tool. |
A. | True |
B. | False |
Answer» C. | |
3. |
______________ tool clears the log entries in the IIS log files filtered by an IP address. |
A. | CleanIISLoging |
B. | CleanLogger |
C. | CleanIISLog |
D. | ClearIISLog |
Answer» D. ClearIISLog | |
4. |
CLEANIISLOG_IS_NOT_A_HACKING_TOOL.?$ |
A. | True |
B. | False |
Answer» C. | |
5. |
_______________TOOL_CLEARS_THE_LOG_ENTRIES_IN_THE_IIS_LOG_FILES_FILTERED_BY_AN_IP_ADDRESS.?$ |
A. | CleanIISLoging |
B. | CleanLogger |
C. | CleanIISLog |
D. | ClearIISLog |
Answer» D. ClearIISLog | |
6. |
Which of the following is not an appropriate countermeasure for web server hacking?$ |
A. | Patch updates need to be done regularly |
B. | Not to use default configurations |
C. | Use IDS and firewalls with signature updates |
D. | Use low-speed internet |
Answer» E. | |
7. |
Which of the following is not a web server attack type? |
A. | DOS attack |
B. | Website Defacement using SQLi |
C. | Directory Traversal |
D. | Password guessing |
Answer» E. | |
8. |
____________ logs all the visits in log files which is located at <%systemroot%>\logfiles. |
A. | IIS |
B. | Microsoft Server |
C. | Linux |
D. | IAS |
Answer» B. Microsoft Server | |
9. |
____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC. |
A. | Spyware |
B. | ASP Trojan |
C. | Web ransomware |
D. | Stuxnet |
Answer» C. Web ransomware | |
10. |
IIS stands for __________________ |
A. | Interconnected Information Server |
B. | Interconnected Information Services |
C. | Internet Information Server |
D. | Internet Information Services |
Answer» E. | |
11. |
_________ is one of the most widely used web server platforms. |
A. | IIS |
B. | IAS |
C. | ISS |
D. | AIS |
Answer» B. IAS | |
12. |
Which of the following is not an appropriate method of defacing web server? |
A. | Fetching credentials through MiTM |
B. | Brute-forcing Admin Password |
C. | IP address spoofing |
D. | DNS Attack through cache poisoning |
Answer» D. DNS Attack through cache poisoning | |
13. |
Which of the following is not an appropriate way to compromise web servers? |
A. | Misconfiguration in OS |
B. | Using network vulnerabilities |
C. | Misconfiguration in networks |
D. | Bugs in OS which allow commands to run on web servers |
Answer» C. Misconfiguration in networks | |