Explore topic-wise MCQs in Cyber Security.

This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is not an appropriate countermeasure for web server hacking?

A. Patch updates need to be done regularly
B. Not to use default configurations
C. Use IDS and firewalls with signature updates
D. Use low-speed internet
Answer» E.
2.

CleanIISLog is not a hacking tool.

A. True
B. False
Answer» C.
3.

______________ tool clears the log entries in the IIS log files filtered by an IP address.

A. CleanIISLoging
B. CleanLogger
C. CleanIISLog
D. ClearIISLog
Answer» D. ClearIISLog
4.

CLEANIISLOG_IS_NOT_A_HACKING_TOOL.?$

A. True
B. False
Answer» C.
5.

_______________TOOL_CLEARS_THE_LOG_ENTRIES_IN_THE_IIS_LOG_FILES_FILTERED_BY_AN_IP_ADDRESS.?$

A. CleanIISLoging
B. CleanLogger
C. CleanIISLog
D. ClearIISLog
Answer» D. ClearIISLog
6.

Which of the following is not an appropriate countermeasure for web server hacking?$

A. Patch updates need to be done regularly
B. Not to use default configurations
C. Use IDS and firewalls with signature updates
D. Use low-speed internet
Answer» E.
7.

Which of the following is not a web server attack type?

A. DOS attack
B. Website Defacement using SQLi
C. Directory Traversal
D. Password guessing
Answer» E.
8.

____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.

A. IIS
B. Microsoft Server
C. Linux
D. IAS
Answer» B. Microsoft Server
9.

____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.

A. Spyware
B. ASP Trojan
C. Web ransomware
D. Stuxnet
Answer» C. Web ransomware
10.

IIS stands for __________________

A. Interconnected Information Server
B. Interconnected Information Services
C. Internet Information Server
D. Internet Information Services
Answer» E.
11.

_________ is one of the most widely used web server platforms.

A. IIS
B. IAS
C. ISS
D. AIS
Answer» B. IAS
12.

Which of the following is not an appropriate method of defacing web server?

A. Fetching credentials through MiTM
B. Brute-forcing Admin Password
C. IP address spoofing
D. DNS Attack through cache poisoning
Answer» D. DNS Attack through cache poisoning
13.

Which of the following is not an appropriate way to compromise web servers?

A. Misconfiguration in OS
B. Using network vulnerabilities
C. Misconfiguration in networks
D. Bugs in OS which allow commands to run on web servers
Answer» C. Misconfiguration in networks