MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
PING_SWEEP_IS_ALSO_KNOWN_AS_________________?$ |
| A. | ICMP Sweep |
| B. | ICMP Call |
| C. | IGMP Sweep |
| D. | ICMP pinging |
| Answer» B. ICMP Call | |
| 2. |
__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.$ |
| A. | Network |
| B. | Port |
| C. | Vulnerability |
| D. | System |
| Answer» C. Vulnerability | |
| 3. |
If any given address is running live, it will return an ICMP ECHO reply.$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
Which of them is not a standard scanning type or terminology? |
| A. | Network |
| B. | Port |
| C. | Vulnerability |
| D. | System |
| Answer» E. | |
| 5. |
_____________ scanning is an automatic process for identifying vulnerabilities of the system within a network. |
| A. | Network |
| B. | Port |
| C. | Vulnerability |
| D. | System |
| Answer» D. System | |
| 6. |
____________ scanning is a procedure to identify active hosts on your network. |
| A. | Network |
| B. | Port |
| C. | Vulnerability |
| D. | System |
| Answer» B. Port | |
| 7. |
A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts? |
| A. | scan sweep |
| B. | ping sweep |
| C. | scan ping |
| D. | host ping |
| Answer» C. scan ping | |
| 8. |
Which of them do not comes under NETBIOS information? |
| A. | Name of the system / PC |
| B. | Workgroup name |
| C. | MAC address |
| D. | RAM space |
| Answer» E. | |
| 9. |
________ attribute is used to tweak the ping timeout value. |
| A. | -time |
| B. | -t |
| C. | -p |
| D. | -tout |
| Answer» C. -p | |
| 10. |
In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 11. |
ICMP scanning is used to scan _______________ |
| A. | open systems |
| B. | live systems |
| C. | malfunctioned systems |
| D. | broken systems |
| Answer» C. malfunctioned systems | |
| 12. |
Which of them is not a scanning methodology? |
| A. | Check for live systems |
| B. | Check for open ports |
| C. | Identifying the malware in the system |
| D. | Identifying of services |
| Answer» D. Identifying of services | |
| 13. |
For discovering the OS running on the target system, the scanning has a specific term. What is it? |
| A. | Footprinting |
| B. | 3D Printing |
| C. | Fingerprinting |
| D. | screen-printing |
| Answer» D. screen-printing | |
| 14. |
Which of the following is not an objective of scanning? |
| A. | Detection of the live system running on network |
| B. | Discovering the IP address of the target system |
| C. | Discovering the services running on target system |
| D. | Detection of spyware in a system |
| Answer» E. | |
| 15. |
There are _______ types of scanning. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |