Recent questions tagged cyber-security-mcq

0 votes
    Which of the following comes after scanning phase in ethical hacking? (a) Scanning (b) Maintaining access (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    In __________ phase the hacker exploits the network or system vulnerabilities. (a) Scanning (b) Maintaining access (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not done in gaining access phase? (a) Tunnelling (b) Buffer overflow (c) Session ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned penetration testing tool is popularly used in gaining access phase? (a) Maltego (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    _______ is the tool used for this purpose. (a) Powersploit (b) Aircrack - ng (c) Snort (d) Nmap The ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    In _______ phase, the hackers try to hide their footprints. (a) Scanning (b) Tracks clearing (c) Reconnaissance ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of them is not a track clearing technique? (a) Altering log files (b) Tunnelling (c) Port Scanning (d ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...