Google News
logo
Cyber Security - Quiz(MCQ)
A)
Private chats
B)
IP Tables
C)
SNMP data, if not secured appropriately
D)
List of username and password policies

Correct Answer : Option (A) :   Private chats


Explanation : Enumeration is an information gaining technique used in ethical hacking to achieve data regarding victim’s IP table, SNMP data, lists of username and passwords of different systems etc but not private chats.

A)
NTP
B)
DNS
C)
HTTP
D)
SNMP

Correct Answer : Option (A) :   NTP


Explanation : NTP Suite is employed for NTP enumeration. This is significant for a network environment; where anyone can discover other primary servers which assist the hosts to update their time, and the entire process can be done without authenticating.

A)
Mac systems
B)
Linux systems
C)
Chrome systems
D)
Windows systems

Correct Answer : Option (B) :   Linux systems


Explanation : ‘enum4linux’ is implemented for enumerating the Linux systems. Using this, the attacker can examine and establish the usernames that are present in a target host.

A)
‘Show full email’
B)
‘forward’ option
C)
‘show original’ option
D)
‘View Original’ option

Correct Answer : Option (C) :   ‘show original’ option


Explanation : It is possible to know the IP address of the sender of your email by opening the email and going to the ‘more’ button and then selecting the ‘show original’ option. In this way, one can find the IP address and do enumeration.

A)
cloud enumerator
B)
software enumerator
C)
hardware enumerator
D)
network enumerator

Correct Answer : Option (D) :   network enumerator


Explanation : A network enumerator is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers. These type of programs are used for network enumeration in order to detect hosts or devices on a particular network.

A)
Cyber-printing
B)
Footprinting
C)
OS fingerprinting
D)
OS penetration testing

Correct Answer : Option (C) :   OS fingerprinting


Explanation : OS fingerprinting is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.

A)
Active fingerprinting
B)
OS fingerprinting
C)
Network fingerprinting
D)
Passive fingerprinting

Correct Answer : Option (A) :   Active fingerprinting


Explanation : Active fingerprinting is gained if you send especially skilled packets to a target machine and then listing down its replies and analyzing the information gathered for determining the target OS.

A)
Perform reverse lookups
B)
Get the admin password
C)
Get the host’s addresses
D)
Get extra names and sub-domains through Google scraping

Correct Answer : Option (B) :   Get the admin password


Explanation : DNSenum is a popular Perl script that can fetch information such as – fetching host address, perform a reverse lookup, get additional name and sub-domain through Google scraping etc.

A)
Worms
B)
Exploits
C)
Antivirus
D)
Firewall by-passers

Correct Answer : Option (B) :   Exploits


Explanation : Exploits are the piece of programs or scripts that allow hackers to take control over any system. Vulnerability scanners such as Nexpose and Nessus are used for finding such vulnerabilities.

A)
Exploit-db
B)
National Vulnerability Database (NVD)
C)
Common Vulnerabilities and Exposures (CVE)
D)
Bing Vulnerability database (BVD)

Correct Answer : Option (D) :   Bing Vulnerability database (BVD)


Explanation : Exploit-db (https://www.exploit-db.com/), Common Vulnerabilities and Exposures (CVE) (https://cve.mitre.org/), and National Vulnerability Database (NVD) (https://nvd.nist.gov/) are three vulnerability listing site.