InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Network enumerator is also known as ________________(a) hardware scanner(b) software enumerator(c) program enumerator(d) network scannerThis question was addressed to me in a national level competition.Question is taken from Enumerating in Cyber Security topic in chapter Cyber Security of Cyber Security |
|
Answer» RIGHT answer is (d) network scanner For explanation: Network enumerator is also known as Network scanner which is a computer program IMPLEMENTED for recovering usernames & INFO on groups, shares as well as services of networked computers. |
|
| 2. |
A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.(a) hardware enumerator(b) software enumerator(c) network enumerator(d) cloud enumeratorThis question was addressed to me in final exam.My question is taken from Enumerating in Cyber Security topic in division Cyber Security of Cyber Security |
|
Answer» Right CHOICE is (c) network ENUMERATOR |
|
| 3. |
Network enumeration is the finding of __________ or devices on a network.(a) hosts(b) servers(c) network connection(d) cloud storageThis question was addressed to me in unit test.The question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security |
|
Answer» Correct answer is (a) HOSTS |
|
| 4. |
__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.(a) Hardware enumeration(b) System enumeration(c) Network enumeration(d) Cloud enumerationI got this question in an interview for job.The query is from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security |
|
Answer» Right option is (c) Network enumeration |
|
| 5. |
___________ is used that tries for guessing the usernames by using SMTP service.(a) smtp-user-enum(b) smtp-enum(c) snmp-enum(d) snmp-user-enumThis question was addressed to me in my homework.This intriguing question originated from Enumerating in Cyber Security in section Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (a) smtp-user-enum |
|
| 6. |
Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email.(a) ‘forward’ option(b) ‘show original’ option(c) ‘Show full email’(d) ‘View Original’ optionThe question was asked in class test.This interesting question is from Enumerating in Cyber Security topic in division Cyber Security of Cyber Security |
|
Answer» The correct option is (b) ‘show original’ option |
|
| 7. |
To stop your system from getting enumerated, you have to disable all services.(a) True(b) FalseThis question was addressed to me in an interview for internship.This intriguing question comes from Enumerating in Cyber Security topic in chapter Cyber Security of Cyber Security |
|
Answer» Correct answer is (a) True |
|
| 8. |
__________ suite is used for NTP enumeration.(a) DNS(b) NTP(c) HTTP(d) SNMPThe question was posed to me in class test.This intriguing question comes from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (b) NTP |
|
| 9. |
enum4linux is used to enumerate _______________(a) Linux systems(b) Windows systems(c) Chrome systems(d) Mac systemsI got this question by my college professor while I was bunking the class.The question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security |
|
Answer» The CORRECT answer is (a) LINUX systems |
|
| 10. |
Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?(a) IP Tables(b) SNMP data, if not secured appropriately(c) Private chats(d) List of username and password policiesI had been asked this question in final exam.Question is taken from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security |
|
Answer» Correct choice is (c) Private chats |
|
| 11. |
Enumeration does not depend on which of the following services?(a) DNS enumeration(b) SNMP enumeration(c) NTP enumeration(d) HTTPS enumerationThis question was posed to me at a job interview.I would like to ask this question from Enumerating in Cyber Security in division Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) HTTPS enumeration |
|
| 12. |
______________ is the first phase of ethical hacking.(a) DNS poisoning(b) Footprinting(c) ARP-poisoning(d) EnumerationThis question was addressed to me in an online quiz.Asked question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security |
|
Answer» Correct answer is (b) FOOTPRINTING |
|
| 13. |
What common web scripting languages are used by attackers to fetch various details from its surfing users?(a) Tcl and C#(b) C++ and HTML(c) HTML and Python(d) Perl and JavaScriptThe question was posed to me in quiz.I would like to ask this question from Enumerating in Cyber Security in division Cyber Security of Cyber Security |
|
Answer» Correct choice is (d) Perl and JAVASCRIPT |
|
| 14. |
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.(a) True(b) FalseThis question was posed to me in an online quiz.This interesting question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security |
|
Answer» Right ANSWER is (a) True |
|
| 15. |
Attackers commonly target ____________ for fetching IP address of a target or victim user.(a) websites(b) web pages(c) ip tracker(d) emailsThis question was addressed to me in homework.My enquiry is from Enumerating in Cyber Security in portion Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (a) websites Explanation: Enumeration by cyber-attackers is possible through websites also, as the attackers TARGET websites for FETCHING the IP address of the victim or the target user. |
|