in Education by
___________________ is the method used to locate all the DNS-servers and their associated records for an organization. (a) DNS enumeration (b) DNS hacking (c) DNS cracking (d) DNS server hacking This question was addressed to me in a job interview. My query is from Fingerprinting in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (a) DNS enumeration To elaborate: DNS enumeration is the method used to locate all the DNS-servers and their associated records for an organization. ‘nslookup’ command can be used on Linux for getting the DNS and host-related information.

Related questions

0 votes
0 votes
0 votes
    The _____________ command is used on Linux for getting the DNS and host-related information. (a) dnslookup (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    DNS trojans are used for performing a type of DNS hijacking. (a) True (b) False The question was asked ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Application level gateway firewalls are also used for configuring cache-servers. (a) True (b) False I got this ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details. ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of DNS hijacking? (a) ISP DNS hijacking (b) DNS hijacking for ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an appropriate way to compromise web servers? (a) Misconfiguration in OS (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ___________________ are some very frequent updates that come for every anti-virus. (a) Patch update (b) Data update ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    BTS stands for ___________________ (a) Basement Transceiver Server (b) Base Transmitter Station (c) Base ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...