Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Network enumerator is also known as ________________(a) hardware scanner(b) software enumerator(c) program enumerator(d) network scannerThis question was addressed to me in a national level competition.Question is taken from Enumerating in Cyber Security topic in chapter Cyber Security of Cyber Security

Answer» RIGHT answer is (d) network scanner

For explanation: Network enumerator is also known as Network scanner which is a computer program IMPLEMENTED for recovering usernames & INFO on groups, shares as well as services of networked computers.
2.

A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.(a) hardware enumerator(b) software enumerator(c) network enumerator(d) cloud enumeratorThis question was addressed to me in final exam.My question is taken from Enumerating in Cyber Security topic in division Cyber Security of Cyber Security

Answer»

Right CHOICE is (c) network ENUMERATOR

To explain: A network enumerator is a computer program implemented for RECOVERING usernames & info on groups, shares as well as services of networked computers. These TYPE of programs are used for network enumeration in order to detect hosts or devices on a PARTICULAR network.

3.

Network enumeration is the finding of __________ or devices on a network.(a) hosts(b) servers(c) network connection(d) cloud storageThis question was addressed to me in unit test.The question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security

Answer»

Correct answer is (a) HOSTS

Best explanation: Network enumeration is the detection of hosts or devices on a particular network. Network enumeration is a computing action USED in which usernames & INFO about user-groups, shares as WELL as services of networked computers can be REGAINED.

4.

__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.(a) Hardware enumeration(b) System enumeration(c) Network enumeration(d) Cloud enumerationI got this question in an interview for job.The query is from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security

Answer»

Right option is (c) Network enumeration

To EXPLAIN: Network enumeration is a computing action used in which usernames & INFO about user-groups, shares as well as SERVICES of networked COMPUTERS can be regained.

5.

___________ is used that tries for guessing the usernames by using SMTP service.(a) smtp-user-enum(b) smtp-enum(c) snmp-enum(d) snmp-user-enumThis question was addressed to me in my homework.This intriguing question originated from Enumerating in Cyber Security in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (a) smtp-user-enum

Best explanation: SNMP-user-enum is used that tries to GUESS the USERNAMES by using SMTP service. Using this, an attacker can EXAMINE and establish the usernames that are present in a target host.

6.

Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email.(a) ‘forward’ option(b) ‘show original’ option(c) ‘Show full email’(d) ‘View Original’ optionThe question was asked in class test.This interesting question is from Enumerating in Cyber Security topic in division Cyber Security of Cyber Security

Answer»

The correct option is (b) ‘show original’ option

For explanation: It is possible to KNOW the IP address of the sender of your email by OPENING the email and going to the ‘more’ BUTTON and then selecting the ‘show original’ option. In this way, one can find the IP address and do ENUMERATION.

7.

To stop your system from getting enumerated, you have to disable all services.(a) True(b) FalseThis question was addressed to me in an interview for internship.This intriguing question comes from Enumerating in Cyber Security topic in chapter Cyber Security of Cyber Security

Answer»

Correct answer is (a) True

To ELABORATE: To stop your system from GETTING ENUMERATED, it is recommended to disable all SERVICES that are not in use. It lessens the potential of OS ENUMERATION of your system.

8.

__________ suite is used for NTP enumeration.(a) DNS(b) NTP(c) HTTP(d) SNMPThe question was posed to me in class test.This intriguing question comes from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (b) NTP

For EXPLANATION I WOULD say: NTP Suite is employed for NTP enumeration. This is significant for a network ENVIRONMENT; where anyone can discover other primary servers which assist the hosts to UPDATE their time, and the entire process can be done without authenticating.

9.

enum4linux is used to enumerate _______________(a) Linux systems(b) Windows systems(c) Chrome systems(d) Mac systemsI got this question by my college professor while I was bunking the class.The question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security

Answer»

The CORRECT answer is (a) LINUX systems

Explanation: ‘enum4linux’ is IMPLEMENTED for enumerating the Linux systems. Using this, the attacker can examine and establish the usernames that are present in a target host.

10.

Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?(a) IP Tables(b) SNMP data, if not secured appropriately(c) Private chats(d) List of username and password policiesI had been asked this question in final exam.Question is taken from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security

Answer»

Correct choice is (c) Private chats

For explanation: Enumeration is an INFORMATION gaining technique used in ethical hacking to achieve data regarding VICTIM’s IP table, SNMP data, LISTS of username and PASSWORDS of different systems etc but not private chats.

11.

Enumeration does not depend on which of the following services?(a) DNS enumeration(b) SNMP enumeration(c) NTP enumeration(d) HTTPS enumerationThis question was posed to me at a job interview.I would like to ask this question from Enumerating in Cyber Security in division Cyber Security of Cyber Security

Answer»

Correct answer is (d) HTTPS enumeration

Explanation: Enumerations depend on the different services that the system offers. These services are – SMB enumeration, DNS enumeration, SNMP NUMERATION, NTP enumeration, and Linux/Windows enumeration.

12.

______________ is the first phase of ethical hacking.(a) DNS poisoning(b) Footprinting(c) ARP-poisoning(d) EnumerationThis question was addressed to me in an online quiz.Asked question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security

Answer»

Correct answer is (b) FOOTPRINTING

Explanation: Footprinting is the first phase of Ethical Hacking where a gathering of INFORMATION is done for the process of hacking or attacking any victim or SYSTEM. Here that attacker tries to DISCOVER as MUCH attack vectors as possible. Footprinting is also known as Reconnaissance.

13.

What common web scripting languages are used by attackers to fetch various details from its surfing users?(a) Tcl and C#(b) C++ and HTML(c) HTML and Python(d) Perl and JavaScriptThe question was posed to me in quiz.I would like to ask this question from Enumerating in Cyber Security in division Cyber Security of Cyber Security

Answer»

Correct choice is (d) Perl and JAVASCRIPT

The explanation is: Various SCRIPTING languages are USED by attackers, such as Perl and JavaScript, that are PROGRAMMED to fetch not only the IP address from the site but also other user’s personal information.

14.

Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.(a) True(b) FalseThis question was posed to me in an online quiz.This interesting question is from Enumerating in Cyber Security in section Cyber Security of Cyber Security

Answer»

Right ANSWER is (a) True

Explanation: Developing a fake or less useful website and is meant to just FETCH the IP address is very easily DONE by attackers. Enumeration by cyber-attackers is possible through websites also, as the attackers target websites for FETCHING the IP address of the victim or the target user.

15.

Attackers commonly target ____________ for fetching IP address of a target or victim user.(a) websites(b) web pages(c) ip tracker(d) emailsThis question was addressed to me in homework.My enquiry is from Enumerating in Cyber Security in portion Cyber Security of Cyber Security

Answer» CORRECT choice is (a) websites

Explanation: Enumeration by cyber-attackers is possible through websites also, as the attackers TARGET websites for FETCHING the IP address of the victim or the target user.