in Education by
Which of the following is not a spot from where attackers seek information? (a) Domain name (b) IP address (c) System enumeration (d) Document files This question was posed to me in quiz. My enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct answer is (d) Document files Explanation: Internet is a common medium for gathering information such as from Domain name, IP address of the target user, enumeration of victim’s system, IDSes running, TCP & UDP services etc.

Related questions

0 votes
    Which of them is not an information source over the internet for target attackers? (a) Whois (b) YouTube (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the companies and organizations do not become the major targets of attackers for data stealing? (a) Business ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    Spywares can be used to steal _______________ from the attacker's browser. (a) browsing history (b) company details ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    _____________ buffer overflows, which are more common among attackers. (a) Memory-based (b) Queue-based (c) Stack ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In a phishing, attackers target the ________ technology to so social engineering. (a) Emails (b) WI-FI network ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Attackers commonly target ____________ for fetching IP address of a target or victim user. (a) websites (b) web ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ___________ is a weakness that can be exploited by attackers. (a) System with Virus (b) System without firewall ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...