MCQOPTIONS
Saved Bookmarks
This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
DNS poisoning is very dangerous because it can extend its reach from one ___________ to another. |
| A. | ISP server |
| B. | DNS server |
| C. | Linux server |
| D. | Domain user |
| Answer» C. Linux server | |
| 2. |
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet. |
| A. | DNS poisoning |
| B. | DNS re-routing |
| C. | DNS cracking |
| D. | Domain link poisoning |
| Answer» B. DNS re-routing | |
| 3. |
A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records. |
| A. | Zone file |
| B. | Robot file |
| C. | Bot file |
| D. | DNS file |
| Answer» B. Robot file | |
| 4. |
Which of the following is not an example of DNS hijacking? |
| A. | ISP DNS hijacking |
| B. | DNS hijacking for phishing |
| C. | DNS hijacking for pharming |
| D. | HTTP-based DNS hacking |
| Answer» E. | |
| 5. |
The _______________ matches and maps to the user friendly domain name. |
| A. | HTTP |
| B. | DNS |
| C. | WWW |
| D. | ISP |
| Answer» C. WWW | |
| 6. |
_____________ can be attained by the use of malware or by changing the server’s settings. |
| A. | DNS poisoning |
| B. | DNS cracking |
| C. | DNS hijacking |
| D. | DNS redirecting |
| Answer» D. DNS redirecting | |
| 7. |
______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings. |
| A. | DNS mal-functioning |
| B. | DNS cracking |
| C. | DNS redirecting |
| D. | DNS hijacking |
| Answer» E. | |
| 8. |
WHICH_OF_THE_FOLLOWING_IS_NOT_AN_EXAMPLE_OF_DNS_HIJACKING??$ |
| A. | ISP DNS hijacking |
| B. | DNS hijacking for phishing |
| C. | DNS hijacking for pharming |
| D. | HTTP-based DNS hacking |
| Answer» E. | |
| 9. |
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of internet.$ |
| A. | DNS poisoning |
| B. | DNS re-routing |
| C. | DNS cracking |
| D. | Domain link poisoning |
| Answer» B. DNS re-routing | |
| 10. |
A________________is_essentially_a_text_file_residing_on_the_server_that_hosts_different_domain_containing_entries_for_dissimilar_resource_records.$ |
| A. | Zone file |
| B. | Robot file |
| C. | Bot file |
| D. | DNS file |
| Answer» B. Robot file | |
| 11. |
The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 12. |
The ____________ Domain Name Server data will get spread to the ISPs & will be cached there. |
| A. | working |
| B. | compromised |
| C. | corrupted |
| D. | poisoned |
| Answer» E. | |
| 13. |
A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it. |
| A. | Server data |
| B. | Domain name |
| C. | DNS cache |
| D. | System file |
| Answer» D. System file | |
| 14. |
DNS_poisoning_is_very_dangerous_because_it_can_extend_its_reach_from_one_____________to_another. |
| A. | ISP server |
| B. | DNS server |
| C. | Linux server |
| D. | Domain user |
| Answer» C. Linux server | |
| 15. |
The _______________ matches and maps to the user friendly domain name? |
| A. | HTTP |
| B. | DNS |
| C. | WWW |
| D. | ISP |
| Answer» C. WWW | |
| 16. |
DNS trojans are used for performing a type of DNS hijacking. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 17. |
There are _________ main types of DNS hijacking. |
| A. | 4 |
| B. | 2 |
| C. | 3 |
| D. | 5 |
| Answer» C. 3 | |
| 18. |
_____________ can be attained by the use of malware or by changing the server’s settings.$ |
| A. | DNS poisoning |
| B. | DNS cracking |
| C. | DNS hijacking |
| D. | DNS redirecting |
| Answer» D. DNS redirecting | |
| 19. |
______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.$ |
| A. | DNS mal-functioning |
| B. | DNS cracking |
| C. | DNS redirecting |
| D. | DNS hijacking |
| Answer» E. | |
| 20. |
Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain. |
| A. | DNS names |
| B. | HTTP setup |
| C. | ISP setup |
| D. | FTP-unsecured |
| Answer» B. HTTP setup | |
| 21. |
DNS stands for _____________ |
| A. | Data Name System |
| B. | Domain Name Server |
| C. | Domain Name System |
| D. | Domain’s Naming System |
| Answer» D. Domain‚Äö√Ñ√∂‚àö√ë‚àö¬•s Naming System | |
| 22. |
__________ is a naming system given to different computers which adapt to human-readable domain names. |
| A. | HTTP |
| B. | DNS |
| C. | WWW |
| D. | ISP |
| Answer» C. WWW | |