in Education by
The _____________ command is used on Linux for getting the DNS and host-related information. (a) dnslookup (b) lookup (c) nslookup (d) infolookup This question was addressed to me in an online quiz. Asked question is from Fingerprinting topic in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (c) nslookup The best I can explain: The ‘nslookup’ command is used on Linux for getting the DNS and host-related information. DNS enumeration is the method used to locate all the DNS-servers and their associated records.

Related questions

0 votes
    DNS stands for _____________ (a) Data Name System (b) Domain Name Server (c) Domain Name System (d) ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
    DNS trojans are used for performing a type of DNS hijacking. (a) True (b) False The question was asked ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Using _____________ for doing competitive information gathering is a crime. (a) Spyware (b) Antivirus (c) Anti-malware ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    The logical port is associated with the type of protocol used along with the IP address of the host. (a) True ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Creators of _____________ also sell your browsing behaviour & information to 3^rd parties. (a) Shareware (b ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...