Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Recent questions tagged cyber-security-mcq
0
votes
Q: How many basic processes or steps are there in ethical hacking?
How many basic processes or steps are there in ethical hacking? (a) 4 (b) 5 (c) 6 (d) 7 This question ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: ____________ is the information gathering phase in ethical hacking from the target user.
____________ is the information gathering phase in ethical hacking from the target user. (a) Reconnaissance (b) Scanning ... questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: Which of the following is not a reconnaissance tool or technique for information gathering?
Which of the following is not a reconnaissance tool or technique for information gathering? (a) Hping (b) NMAP (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: There are ______ subtypes of reconnaissance.
There are ______ subtypes of reconnaissance. (a) 2 (b) 3 (c) 4 (d) 5 This question was addressed to me in ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: Which of the following is an example of active reconnaissance?
Which of the following is an example of active reconnaissance? (a) Searching public records (b) Telephone calls as ... questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: Which of the following is an example of passive reconnaissance?
Which of the following is an example of passive reconnaissance? (a) Telephonic calls to target victim (b) Attacker ... questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: ________ phase in ethical hacking is known as the pre-attack phase.
________ phase in ethical hacking is known as the pre-attack phase. (a) Reconnaissance (b) Scanning (c) Gaining ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ... questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: Which of them does not comes under scanning methodologies?
Which of them does not comes under scanning methodologies? (a) Vulnerability scanning (b) Sweeping (c) Port Scanning ... questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: Which of them is not a scanning tool?
Which of them is not a scanning tool? (a) NMAP (b) Nexpose (c) Maltego (d) Nessus I had been asked this ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 5, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
Page:
« prev
1
...
5
6
7
8
9
10
11
...
49
next »
...