MCQOPTIONS
Saved Bookmarks
This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the design phase is shown in below diagram? |
| A. | Conceptual Design |
| B. | Preliminary Design |
| C. | First order sizing |
| D. | Detail Design |
| Answer» E. | |
| 2. |
What is meant by the term Lofting? |
| A. | Specifications and Requirements |
| B. | Conceptual Drawing |
| C. | Mathematical modelling of the skin |
| D. | Trade study specifications |
| Answer» D. Trade study specifications | |
| 3. |
The main objective of the Preliminary stage is ______ |
| A. | manufacture |
| B. | fabrication |
| C. | first order sizing |
| D. | lofting |
| Answer» E. | |
| 4. |
The aim of the Preliminary Design stage is to make the company ready for the full scale development. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 5. |
Which of these is not part of the Conceptual Design phase? |
| A. | Specifications and Requirements |
| B. | Conceptual Drawing |
| C. | First weight estimation |
| D. | Lofting |
| Answer» E. | |
| 6. |
Which of the following is the correct pair in chronological order? |
| A. | Detail Design-Preliminary Design-Conceptual Design |
| B. | Conceptual Design-Preliminary Design-Detail Design |
| C. | Conceptual Design-Detail Design-Preliminary Design |
| D. | Preliminary Design-Detail Design-Conceptual Design |
| Answer» C. Conceptual Design-Detail Design-Preliminary Design | |
| 7. |
Can we use similar design phases for an Airplane and for a Helicopter? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 8. |
Which of the following is a correct pair? |
| A. | Testing major parts for fabrication – Conceptual Design |
| B. | Testing major parts for fabrication – Detail Design |
| C. | Testing major parts for fabrication – Preliminary Design |
| D. | Testing major parts for fabrication – Initial Design |
| Answer» C. Testing major parts for fabrication – Preliminary Design | |
| 9. |
Which are the phases of Aircraft Design process? |
| A. | Conceptual Design only |
| B. | Conceptual Design, Preliminary Design and Detail Design |
| C. | Only Preliminary Phase |
| D. | Only Detail Design Phase |
| Answer» B. Conceptual Design, Preliminary Design and Detail Design | |
| 10. |
The requirements of an Aircraft will fall in ______ phase. |
| A. | surface requirement |
| B. | preliminary design |
| C. | detail design |
| D. | conceptual design |
| Answer» E. | |
| 11. |
The whole Design philosophy of an Aircraft is termed as _____ |
| A. | design wheel |
| B. | anatomy |
| C. | design evaluation |
| D. | sizing |
| Answer» B. anatomy | |
| 12. |
What is the initial phase of an Aircraft Design? |
| A. | Conceptual Design |
| B. | Preliminary Design |
| C. | Detail Design |
| D. | Sizing |
| Answer» B. Preliminary Design | |
| 13. |
In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication. |
| A. | IP address, protocol |
| B. | MAC address, protocol |
| C. | IP address, IMEI number |
| D. | MAC address, network model |
| Answer» B. MAC address, protocol | |
| 14. |
If any given address is running live, it will return an ICMP ECHO reply. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 15. |
__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer. |
| A. | Network |
| B. | Port |
| C. | Vulnerability |
| D. | System |
| Answer» C. Vulnerability | |
| 16. |
A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts. |
| A. | scan sweep |
| B. | ping sweep |
| C. | scan ping |
| D. | host ping |
| Answer» C. scan ping | |
| 17. |
Ping sweep is also known as ________________ |
| A. | ICMP Sweep |
| B. | ICMP Call |
| C. | IGMP Sweep |
| D. | ICMP pinging |
| Answer» B. ICMP Call | |
| 18. |
______________ is the unauthorized movement of data. |
| A. | Data exfiltration |
| B. | Data infiltration |
| C. | Data cracking |
| D. | Database hacking |
| Answer» B. Data infiltration | |
| 19. |
_____________ focuses on the detection & prevention of sensitive data exfiltration and lost data. |
| A. | Data loss prevention |
| B. | Data loss measurement |
| C. | Data stolen software |
| D. | Data leak prevention |
| Answer» B. Data loss measurement | |
| 20. |
____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups. |
| A. | Competitive Intelligence gathering |
| B. | Cognitive Intelligence gathering |
| C. | Cyber Intelligence gathering |
| D. | Competitors Info gathering |
| Answer» B. Cognitive Intelligence gathering | |
| 21. |
Which of the following is a site used for Competitive Intelligence gathering? |
| A. | https://www.bidigital.gov/ |
| B. | https://www.cig.com/ci/ |
| C. | https://www.coginfo.com/ci/ |
| D. | https://www.bidigital.com/ci/ |
| Answer» E. | |
| 22. |
Predict and analyze the tactics of competitors from data taken out from online data sources is a crime. |
| A. | True |
| B. | False |
| Answer» C. | |
| 23. |
https://www.bidigital.com/ci/ is a website which is used for _________________ |
| A. | Competitive Intelligence gathering |
| B. | Cognitive Intelligence gathering |
| C. | Cyber Intelligence gathering |
| D. | Competitors Info gathering |
| Answer» B. Cognitive Intelligence gathering | |
| 24. |
Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 25. |
https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 26. |
You can attain a series of IP addresses allotted to a particular company using __________ site. |
| A. | https://www.ipdata.org/ |
| B. | https://www.arin.net/ |
| C. | https://www.ipip.com/ |
| D. | https://www.goipaddr.net/ |
| Answer» C. https://www.ipip.com/ | |
| 27. |
Which of the following is not a feature of Hping2 tool? |
| A. | Firewall testing |
| B. | Port scanning |
| C. | Network testing |
| D. | Server malware scanning |
| Answer» E. | |
| 28. |
Which of the following is not a valid scanning method? |
| A. | Xmas Tree scan |
| B. | SYN Stealth scan |
| C. | Null Scan |
| D. | Cloud scan |
| Answer» E. | |
| 29. |
___________ is a command-line TCP/IP packet assembler and analyzer tool. |
| A. | IGMP Ping |
| B. | Hping2 |
| C. | Nmap |
| D. | Maltego |
| Answer» C. Nmap | |
| 30. |
_________________is quite an esoteric process for preventing session creation through a particular port. |
| A. | Port knocking |
| B. | Port cracking |
| C. | Port hacking |
| D. | Port-jacking |
| Answer» B. Port cracking | |