Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The configuration of DNS needs to be done in a secure way.(a) True(b) FalseThe question was posed to me in quiz.The query is from Fingerprinting in portion Cyber Security of Cyber Security

Answer»

Right option is (a) True

The best EXPLANATION: Configuration of DNS needs to be done in a secure WAY, otherwise it is POSSIBLE that cyber-criminals and hackers may TAKE away lots of sensitive INFORMATION from the organization.

2.

___________________ is the method used to locate all the DNS-servers and their associated records for an organization.(a) DNS enumeration(b) DNS hacking(c) DNS cracking(d) DNS server hackingThis question was addressed to me in a job interview.My query is from Fingerprinting in section Cyber Security of Cyber Security

Answer»

The correct option is (a) DNS ENUMERATION

To elaborate: DNS enumeration is the method USED to locate all the DNS-servers and their ASSOCIATED RECORDS for an organization. ‘NSLOOKUP’ command can be used on Linux for getting the DNS and host-related information.

3.

Which of the following operations DNSenum cannot perform?(a) Perform reverse lookups(b) Get the host’s addresses(c) Get extra names and sub-domains through Google scraping(d) Get the admin passwordI had been asked this question in exam.Question is from Fingerprinting topic in chapter Cyber Security of Cyber Security

Answer»

Right option is (d) Get the admin password

The best explanation: DNSenum is a popular Perl script that can FETCH INFORMATION such as – FETCHING host ADDRESS, perform a reverse lookup, get additional name and sub-domain through GOOGLE scraping etc.

4.

The _____________ command is used on Linux for getting the DNS and host-related information.(a) dnslookup(b) lookup(c) nslookup(d) infolookupThis question was addressed to me in an online quiz.Asked question is from Fingerprinting topic in portion Cyber Security of Cyber Security

Answer»

The correct answer is (c) nslookup

The BEST I can explain: The ‘nslookup’ command is USED on Linux for GETTING the DNS and host-related information. DNS enumeration is the METHOD used to LOCATE all the DNS-servers and their associated records.

5.

Ping sweep is also known as ________________(a) ICMP sweep(b) SNMP sweep(c) SGNP sweep(d) SICMP sweepThis question was posed to me during an internship interview.This interesting question is from Fingerprinting topic in section Cyber Security of Cyber Security

Answer»
6.

A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.(a) ping-based hacking(b) ping sweep(c) ping-range(d) pingingI had been asked this question in a national level competition.The doubt is from Fingerprinting in portion Cyber Security of Cyber Security

Answer»

The correct ANSWER is (b) PING sweep

For explanation: A ping sweep is a network SCANNING practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.

7.

To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server.(a) True(b) FalseThis question was posed to me in final exam.The doubt is from Fingerprinting in section Cyber Security of Cyber Security

Answer»

Right option is (a) True

The explanation: It is recommended to hide your system from such fingerprinting attack, performed by hackers, with a SECURE proxy SERVER by USING VPN TOOLS. This technique will COMPLETELY preserve your identity and hence your system.

8.

By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.(a) True(b) FalseI have been asked this question in quiz.My question is from Fingerprinting topic in section Cyber Security of Cyber Security

Answer»

The correct answer is (a) True

The explanation is: There are FOUR basic elements that an ethical hacker should look at to DETERMINE the OPERATING SYSTEM. By analyzing these elements TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.

9.

______________ is a common tool used for doing OS fingerprinting.(a) Hping(b) Wireshark(c) Nmap(d) NessusThis question was posed to me during an online interview.My question comes from Fingerprinting in division Cyber Security of Cyber Security

Answer» CORRECT OPTION is (c) Nmap

The best explanation: Nmap is a common tool that is used for PERFORMING OS fingerprinting. Before targeting any system for the attack, it is necessary to know what OS the website is HOSTING, which can be found out using some simple command of this tool.
10.

Which of the following do not comes under the important element of OS fingerprinting?(a) TTL(b) TOS(c) DF bits(d) FirewallI have been asked this question during a job interview.This intriguing question originated from Fingerprinting topic in chapter Cyber Security of Cyber Security

Answer»

The CORRECT option is (d) Firewall

The explanation: There are four basic ELEMENTS that an ETHICAL hacker should LOOK at to DETERMINE the operating system. These are TTL (time to Live), Don’t fragment bit, Window Size, and Type of Service (TOS).

11.

How many basic elements are there for OS fingerprinting?(a) 2(b) 3(c) 4(d) 5I had been asked this question in my homework.The origin of the question is Fingerprinting topic in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (c) 4

The explanation is: There are four basic ELEMENTS that an ETHICAL hacker should look at to determine the operating SYSTEM. These are TTL, Don’t fragment bit, Window Size, and Type of Service (TOS).

12.

_______________________ is based on sniffer traces from the remote system.(a) Active fingerprinting(b) Passive fingerprinting(c) OS fingerprinting(d) Network fingerprintingI got this question during an interview for a job.I need to ask this question from Fingerprinting topic in portion Cyber Security of Cyber Security

Answer»

Correct answer is (b) Passive fingerprinting

The best EXPLANATION: Passive fingerprinting is DEPENDENT on the sniffing traces from any remote SYSTEM. Depending on the sniffing traces done by tools like Wireshark, attackers can establish and verify the OS of the remote HOST.

13.

_______________________ is gained if you send especially skilled packets to a target machine.(a) Active fingerprinting(b) Passive fingerprinting(c) OS fingerprinting(d) Network fingerprintingThis question was addressed to me in an online interview.Asked question is from Fingerprinting topic in section Cyber Security of Cyber Security

Answer»

Correct answer is (a) Active FINGERPRINTING

To elaborate: Active fingerprinting is gained if you SEND especially skilled packets to a TARGET machine and then listing down its replies and analyzing the information GATHERED for determining the target OS.

14.

How many types of fingerprinting are there in ethical hacking?(a) 5(b) 4(c) 3(d) 2I have been asked this question in exam.Question is taken from Fingerprinting topic in section Cyber Security of Cyber Security

Answer»

Correct ANSWER is (d) 2

To elaborate: There are two types of FINGERPRINTING in ethical hacking. These are active fingerprinting and passive fingerprinting. Active fingerprinting is gained if you SEND especially skilled packets to a TARGET machine whereas passive fingerprinting is DEPENDENT on sniffer traces from the remote computer.

15.

________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.(a) Footprinting(b) Cyber-printing(c) OS fingerprinting(d) OS penetration testingI have been asked this question at a job interview.My enquiry is from Fingerprinting in portion Cyber Security of Cyber Security

Answer»

Correct CHOICE is (c) OS fingerprinting

Explanation: OS fingerprinting is an ethical hacking technique USED for determining what OPERATING system (OS) is RUNNING on a remote computer.