MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Collecting freely available information over the internet is an example of ____________ type of information gathering. |
| A. | active |
| B. | passive |
| C. | active & passive |
| D. | non-passive |
| Answer» C. active & passive | |
| 2. |
Using spyware is an example of _________ type of information gathering. |
| A. | active |
| B. | passive |
| C. | active & passive |
| D. | non-passive |
| Answer» B. passive | |
| 3. |
ARIN is abbreviated as _____________ |
| A. | American Registry for Internet Numbers |
| B. | American Registry for IP Numbers |
| C. | All Registry for Internet Numbers |
| D. | American Registry for IP Numbering |
| Answer» B. American Registry for IP Numbers | |
| 4. |
You can attain a series of IP addresses allotted to a particular company using __________ site. |
| A. | https://www.ipdata.org/ |
| B. | https://www.arin.net/ |
| C. | https://www.ipip.com/ |
| D. | https://www.goipaddr.net/ |
| Answer» C. https://www.ipip.com/ | |
| 5. |
Information about people is available people search sites. Which of them is an example of people data searching site? |
| A. | people.com |
| B. | indivinfo.org |
| C. | intelius.com |
| D. | peopleinfo.org |
| Answer» D. peopleinfo.org | |
| 6. |
https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
Spywares can be used to steal _______________ from the attacker’s browser. |
| A. | browsing history |
| B. | company details |
| C. | plug-ins used |
| D. | browser details |
| Answer» B. company details | |
| 8. |
Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
Which of them is not an information source over the internet for target attackers? |
| A. | Whois |
| B. | YouTube |
| C. | Nslookup |
| D. | Archive sites |
| Answer» C. Nslookup | |
| 10. |
Which of the following is not a spot from where attackers seek information? |
| A. | Domain name |
| B. | IP address |
| C. | System enumeration |
| D. | Document files |
| Answer» E. | |
| 11. |
_______________ is necessary to methodically & systematically ensure all pieces of information related to target. |
| A. | Fingerprinting |
| B. | 3D printing |
| C. | Footprinting |
| D. | Data printing |
| Answer» D. Data printing | |
| 12. |
A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack. |
| A. | security analyst |
| B. | attacker |
| C. | auditor |
| D. | network engineer |
| Answer» C. auditor | |
| 13. |
________________ is one of the 3 pre-attacking phase. |
| A. | Fingerprinting |
| B. | 3D printing |
| C. | Footprinting |
| D. | Data printing |
| Answer» D. Data printing | |
| 14. |
How many types of footprinting are there? |
| A. | 5 |
| B. | 4 |
| C. | 3 |
| D. | 2 |
| Answer» E. | |
| 15. |
________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network. |
| A. | Fingerprinting |
| B. | 3D printing |
| C. | Footprinting |
| D. | Data printing |
| Answer» D. Data printing | |