Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which one of them is not a network scanner?(a) NMAP(b) Qualys(c) SoftPerfect(d) NetcatI had been asked this question by my school teacher while I was bunking the class.This interesting question is from Scanning Phase for Security topic in portion Phases of Security of Cyber Security

Answer» RIGHT OPTION is (d) Netcat

Best EXPLANATION: NMAP, Qualys, and SoftPerfect are all network scanning tools. Network scanning is USED for a computer network to gather information about the computing SYSTEMS.
2.

Which of them is not a vulnerability scanning tool?(a) Nexpose(b) Nessus Professional(c) Snort(d) Nikto Web scannerThe question was asked in an online interview.The doubt is from Scanning Phase for Security in chapter Phases of Security of Cyber Security

Answer»

Correct CHOICE is (c) Snort

Explanation: Nexpose, Nikto Web SCANNER, and Nessus Professional are some of the popular VULNERABILITY scanning tools. Vulnerability scanners are inspection tools used to CHECK for potential points of exploit on a system or NETWORK for identifying security holes.

3.

Which of them is not a port scanning tool?(a) Netcat(b) Unicornscan(c) Maltego(d) Angry IP ScannerThe question was posed to me in homework.I would like to ask this question from Scanning Phase for Security in section Phases of Security of Cyber Security

Answer»

The correct choice is (C) Maltego

Best explanation: Netcat, Unicornscan, Angry IP scanners are some of the POPULAR tools USED for PORT scanning. These TYPES of tools are a special type of application designed for probing a server or host for open ports.

4.

_________________ is quite an esoteric process for preventing session creation through a particular port.(a) Port knocking(b) Port cracking(c) Port hacking(d) Port-jackingI got this question in quiz.My question is from Scanning Phase for Security topic in chapter Phases of Security of Cyber Security

Answer»

The correct choice is (a) PORT knocking

Explanation: Port knocking is quite an esoteric PROCESS for preventing session creation through a particular port. Port knocking is not presently used by default in any stack, but soon PATCHES will come to ALLOW the use of knocking protocols.

5.

Which of the following is not a feature of Hping2 tool?(a) Firewall testing(b) Port scanning(c) Network testing(d) Server malware scanningThis question was posed to me in an online quiz.This interesting question is from Scanning Phase for Security in portion Phases of Security of Cyber Security

Answer»

The correct OPTION is (d) Server malware scanning

For explanation I would say: Hping2 is a command-line TCP/IP packet ASSEMBLER and analyzer TOOL. Also, it has a trace-route mode. It has the ability to send files between COVERED channels & also SUPPORTS ICMP echo requests. Server malware scanning is not a valid feature of Hping2 tool.

6.

How many standard flags are used in TCP communication?(a) 4(b) 5(c) 6(d) 7The question was posed to me in an interview.My query is from Scanning Phase for Security in section Phases of Security of Cyber Security

Answer»

Right OPTION is (c) 6

The BEST I can explain: There are 6 standard flags are USED in a TCP communication between client and server. These standard flags are: Synchronize, Acknowledgement, Push, URGENT, FINISH and Reset.

7.

___________ is a command-line TCP/IP packet assembler and analyzer tool.(a) IGMP Ping(b) Hping2(c) Nmap(d) MaltegoI have been asked this question in an internship interview.Origin of the question is Scanning Phase for Security topic in chapter Phases of Security of Cyber Security

Answer»

Right answer is (b) Hping2

The best explanation: Hping2 is a command-line TCP/IP packet assembler and ANALYZER TOOL. Also, it has a trace-route mode. It has the ABILITY to SEND FILES between covered channels & also supports ICMP echo requests.

8.

Which of the following is not a valid scanning method?(a) Xmas Tree scan(b) SYN Stealth scan(c) Null Scan(d) Cloud scanThe question was posed to me in an online interview.The doubt is from Scanning Phase for Security topic in division Phases of Security of Cyber Security

Answer» CORRECT option is (d) CLOUD scan

The explanation is: Some popular scanning methods USED for scanning connections and ports are – Xmas TREE scan, SYN Stealth Scan, NULL Scan, Window Scan, ACK scan, UDP scan etc.
9.

Which of them is not a standard flag used in TCP communication between client and server?(a) Synchronize(b) Acknowledgment(c) Finish(d) StartThis question was addressed to me in exam.Enquiry is from Scanning Phase for Security topic in chapter Phases of Security of Cyber Security

Answer»

The correct choice is (d) Start

Best explanation: Start is not a standard and VALID flag of TCP communication in a client-server connection. These standard flags are: SYNCHRONIZE Acknowledgement, Push, Urgent, Finish and RESET.

10.

Using 3-way handshake, it is possible to check for open ports.(a) True(b) FalseThis question was posed to me in final exam.The question is from Scanning Phase for Security in chapter Phases of Security of Cyber Security

Answer» CORRECT answer is (a) True

Explanation: OPEN ports can be CHECKED where a COMPUTER initiates a connection to the server with SYN flag set. The server replies with both SYN & ACK flag set. Finally, the client responds back to the server with the ACK packet.
11.

Firewalk works by sending ________ & ________ packets.(a) UDP, HTTP(b) TCP, HTTP(c) ICMP, TCP(d) UDP, TCPI got this question in exam.The question is from Scanning Phase for Security in chapter Phases of Security of Cyber Security

Answer»

The correct CHOICE is (d) UDP, TCP

The best explanation: Firewalk is a tool which uses traceroute-like techniques for analyzing IP packet RESPONSES. Firewalk works by sending UDP & TCP PACKETS. It determines filter rules in place on all packet forwarding DEVICES.

12.

Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.(a) filter, packet(b) filter, port(c) routing, packet(d) routing, portThis question was addressed to me at a job interview.Query is from Scanning Phase for Security in section Phases of Security of Cyber Security

Answer» RIGHT option is (a) filter, packet

Best explanation: Firewalk is a tool which uses traceroute-like TECHNIQUES for analyzing IP packet responses. It determines GATEWAY ACL and filters & map NETWORKS. Specifically, it determines filter RULES in place on all packet forwarding devices.
13.

In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.(a) address(b) port(c) system(d) networkThe question was posed to me in exam.My question comes from Scanning Phase for Security in portion Phases of Security of Cyber Security

Answer»

Correct choice is (b) PORT

To explain: In port scanning, a port is always associated with an IP address (TYPICALLY of the host system) & the type of PROTOCOL (UDP or TCP) employed for communication.

14.

In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.(a) IP address, protocol(b) MAC address, protocol(c) IP address, IMEI number(d) MAC address, network modelI had been asked this question during an online exam.The origin of the question is Scanning Phase for Security in division Phases of Security of Cyber Security

Answer»

Right answer is (a) IP ADDRESS, protocol

For EXPLANATION: In port scanning, a port is always associated with an IP address (typically of HOST system) & the type of protocol (UDP or TCP) employed for communication.

15.

________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses.(a) Firewalk(b) Firesweep(c) PingSweeper(d) ICMPwalkerI have been asked this question in a national level competition.I would like to ask this question from Scanning Phase for Security topic in division Phases of Security of Cyber Security

Answer» CORRECT option is (a) FIREWALK

For explanation: Firewalk is a tool which is used traceroute-like TECHNIQUES for analysing IP packet responses. It determines gateway ACL and filters & map networks. Specifically, it determines filter rules in place on all packet forwarding devices.
16.

Which of them is not a standard scanning type or terminology?(a) Network(b) Port(c) Vulnerability(d) SystemThis question was posed to me by my college professor while I was bunking the class.I'd like to ask this question from Scanning Phase for Security topic in division Phases of Security of Cyber Security

Answer»

The correct choice is (d) System

The EXPLANATION is: There are a total of three TYPES of scanning in ETHICAL hacking and cyber-security. These are VULNERABILITY scanning, network scanning & port scanning. System scanning is not a standard TERMINOLOGY or type of scanning.

17.

_____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.(a) Network(b) Port(c) Vulnerability(d) SystemThe question was posed to me in an interview for job.The question is from Scanning Phase for Security topic in portion Phases of Security of Cyber Security

Answer»

The correct OPTION is (c) Vulnerability

Explanation: Vulnerability SCANNING is an automatic process for IDENTIFYING VULNERABILITIES of a computing system WITHIN a network. It is one of the popular scanning methodologies.

18.

____________ scanning is a procedure to identify active hosts on your network.(a) Network(b) Port(c) Vulnerability(d) SystemThis question was addressed to me by my school teacher while I was bunking the class.This intriguing question originated from Scanning Phase for Security topic in section Phases of Security of Cyber Security

Answer»

Right CHOICE is (a) Network

To explain: Network SCANNING is a PROCEDURE to IDENTIFY active hosts on your network. It is done with the intention to either attack your system or for security purposes by ethical hackers.

19.

If any given address is running live, it will return an ICMP ECHO reply.(a) True(b) FalseI got this question by my school principal while I was bunking the class.This interesting question is from Scanning Phase for Security in division Phases of Security of Cyber Security

Answer»

Right CHOICE is (a) True

Best explanation: ICMP sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep CONSISTS of ICMP ECHO requests. If any given address is RUNNING live, it will return an ICMP ECHO reply.

20.

__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.(a) Network(b) Port(c) Vulnerability(d) SystemI have been asked this question in an online interview.Question is from Scanning Phase for Security in division Phases of Security of Cyber Security

Answer»

Right option is (b) Port

Explanation: Scanning is done when a series of messages are SENT by SOMEONE keeping in mind to break into a computer to LEARN about computer NETWORK SERVICES.

21.

Ping sweep is also known as ________________(a) ICMP Sweep(b) ICMP Call(c) IGMP Sweep(d) ICMP pingingI got this question in homework.Origin of the question is Scanning Phase for Security topic in section Phases of Security of Cyber Security

Answer»

Correct answer is (a) ICMP Sweep

For explanation I would say: PING sweep is ALSO known as ICMP sweep is a SIMPLE network scanning technique USED for determining which RANGE of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.

22.

A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.(a) scan sweep(b) ping sweep(c) scan ping(d) host pingI had been asked this question in quiz.The question is from Scanning Phase for Security in section Phases of Security of Cyber Security

Answer»

The correct CHOICE is (b) ping sweep

The EXPLANATION is: A ping sweep is a SIMPLE network scanning technique used for determining which range of IP ADDRESS MAP to live hosts. The ping sweep consists of ICMP ECHO requests.

23.

Which of them do not comes under NETBIOS information?(a) Name of the system / PC(b) Workgroup name(c) MAC address(d) RAM spaceI had been asked this question in homework.This intriguing question comes from Scanning Phase for Security in portion Phases of Security of Cyber Security

Answer»

Right choice is (d) RAM space

To explain I would say: SCANNING using IP address SIMPLY pings each IP address for checking if it is live or not. This helps in providing NETBIOS INFORMATION such as the name of the system, WORKGROUP and MAC address.

24.

In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.(a) True(b) FalseI have been asked this question in an online quiz.Question is from Scanning Phase for Security in division Phases of Security of Cyber Security

Answer»

The correct option is (a) True

The best explanation: Check for live systems, open ports and identification of SERVICES running on the systems are some of the STEPS and methodologies USED in SCANNING. In live system scanning, it is checked which HOSTS are up in the network by pinging the systems in the network.

25.

________ attribute is used to tweak the ping timeout value.(a) -time(b) -t(c) -p(d) -toutThis question was posed to me in an interview for internship.My doubt stems from Scanning Phase for Security in portion Phases of Security of Cyber Security

Answer»

Correct CHOICE is (B) -t

To elaborate: -t attribute is used while pinging any SYSTEM to tweak the ping timeout value. It is an example of live system scanning, to CHECK which hosts are up in the NETWORK by pinging the systems in the network.

26.

ICMP scanning is used to scan _______________(a) open systems(b) live systems(c) malfunctioned systems(d) broken systemsThis question was posed to me in a job interview.Asked question is from Scanning Phase for Security topic in portion Phases of Security of Cyber Security

Answer»

Correct answer is (b) LIVE systems

Best explanation: Check for live systems, OPEN ports and identification of services running on the systems are some of the steps and methodologies USED in scanning. ICMP scanning is used for CHECKING live systems.

27.

For discovering the OS running on the target system, the scanning has a specific term. What is it?(a) Footprinting(b) 3D Printing(c) Fingerprinting(d) screen-printingThe question was asked at a job interview.I'd like to ask this question from Scanning Phase for Security in section Phases of Security of Cyber Security

Answer» RIGHT choice is (c) Fingerprinting

To explain: Fingerprinting is the name of that specific type of SCANNING For discovering the OS running on the TARGET system in a network which comes under OS scanning technique.
28.

Which of them is not a scanning methodology?(a) Check for live systems(b) Check for open ports(c) Identifying the malware in the system(d) Identifying of servicesI have been asked this question by my school teacher while I was bunking the class.My question is from Scanning Phase for Security in division Phases of Security of Cyber Security

Answer»

Right option is (c) IDENTIFYING the malware in the system

To explain: Check for LIVE SYSTEMS, OPEN ports and identification of services running on the systems are some of the steps and methodologies used in SCANNING.

29.

Which of the following is not an objective of scanning?(a) Detection of the live system running on network(b) Discovering the IP address of the target system(c) Discovering the services running on target system(d) Detection of spyware in a systemThis question was posed to me in quiz.My query is from Scanning Phase for Security topic in division Phases of Security of Cyber Security

Answer»

The correct choice is (d) Detection of spyware in a SYSTEM

The best explanation: Detection of the live system running on the NETWORK, DISCOVERING the IP ADDRESS of the target system, & discovering the SERVICES running on the target system are some of the objectives of scanning.

30.

There are _______ types of scanning.(a) 2(b) 3(c) 4(d) 5This question was posed to me in unit test.Question is taken from Scanning Phase for Security topic in portion Phases of Security of Cyber Security

Answer»

Correct choice is (B) 3

The best EXPLANATION: There are a total of three types of scanning in ethical HACKING and cyber-security. These are VULNERABILITY scanning, network scanning & port scanning.

31.

Competitive Intelligence gathering is both a ___________ and a ____________(a) process, product(b) process, item(c) product & data to sell to 3rd party(d) data to sell to a 3rd party and a productI had been asked this question in an online interview.This intriguing question originated from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

The correct CHOICE is (a) process, product

For explanation I would say: In the world of data, where data is considered the oil and fuel of modern TECHNOLOGY, Competitive Intelligence gathering is both a product and a process which comprises of some PREDEFINED steps to HANDLE data.

32.

Using _____________ for doing competitive information gathering is a crime.(a) Spyware(b) Antivirus(c) Anti-malware(d) AdwareI got this question by my school principal while I was bunking the class.I'm obligated to ask this question of Information Gathering Phase & Techniques topic in division Phases of Security of Cyber Security

Answer»

Right answer is (a) Spyware

Easiest explanation: By the name of competitive information gathering if DONE in the form of active ATTACK using malware or by other illicit means can PUT your HIRED HACKER or your company at stake. It’s a cyber-crime.

33.

Which of the following is not an example of a firm that provides info regarding competitive intelligence gathering?(a) Carratu International(b) CI Center(c) Microsoft CI(d) Marven Consulting GroupI have been asked this question by my college professor while I was bunking the class.Asked question is from Information Gathering Phase & Techniques topic in division Phases of Security of Cyber Security

Answer»

Correct choice is (c) Microsoft CI

The explanation is: Carratu INTERNATIONAL, CI CENTER, Marven Consulting Group, Lubrinco Pvt LTD. are some of the names of FIRMS and companies that provide INFO regarding competitive intelligence gathering.

34.

Which of the following is a site used for Competitive Intelligence gathering?(a) https://www.bidigital.gov/(b) https://www.cig.com/ci/(c) https://www.coginfo.com/ci/(d) https://www.bidigital.com/ci/This question was posed to me during an interview for a job.Question is from Information Gathering Phase & Techniques in section Phases of Security of Cyber Security

Answer»

Right ANSWER is (d) https://www.bidigital.com/ci/

The explanation: In the world of data, where data is considered the oil and fuel of MODERN technology, COMPETITIVE Intelligence gathering is both a PRODUCT and a process. https://www.bidigital.com/ci/ is a WEBSITE which is used for such purpose.

35.

Predict and analyze the tactics of competitors from data taken out from online data sources is a crime.(a) True(b) FalseI had been asked this question in final exam.I'd like to ask this question from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security

Answer»

Correct answer is (b) False

The BEST I can explain: Predict and analyze the tactics of competitors from data taken out from online data sources is a crime. In the world of data, where data is considered the oil and FUEL of modern TECHNOLOGY. It can be done using COMPETITIVE intelligence gathering techniques.

36.

Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake.(a) True(b) FalseI got this question in an online quiz.I want to ask this question from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security

Answer»

Correct choice is (a) True

Easy explanation: By the NAME of competitive information gathering if done in the FORM of active attack using malware or by other illicit MEANS can PUT your hired HACKER or your company at stake. It’s a cyber-crime also.

37.

Which of them is not a reason for competitive information gathering?(a) Compare your product with competitors(b) Analyze the market position of yours with competitors(c) Fetching confidential plans about your competitors(d) Pull out a list of your competitive firms in the marketThis question was addressed to me in an internship interview.Query is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security

Answer»

Right ANSWER is (C) FETCHING confidential plans about your COMPETITORS

Best explanation: Fetching confidential plans about your competitors’ is not the work of ethical hackers hired for competitive information gathering. Also fetching such type of confidential information is a crime.

38.

There are __________ types of cognitive hacking and information gathering which is based on the source type, from where data is fetched.(a) 6(b) 5(c) 4(d) 3I have been asked this question in an online interview.Asked question is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security

Answer»

The correct option is (d) 3

The explanation: There are two types of cognitive HACKING and information gathering which are BASED on the source TYPE, from where data is fetched. These are single source & MULTIPLE SOURCES.

39.

Which one of the following is a proper step in competitive intelligence data processing?(a) Competitors’ data compromising(b) Data hacking(c) Data analysis(d) Competitors’ data stealingI have been asked this question in final exam.Enquiry is from Information Gathering Phase & Techniques topic in section Phases of Security of Cyber Security

Answer»

The CORRECT answer is (c) Data analysis

The EXPLANATION: In the WORLD of data, where data is considered the OIL and fuel of modern technology, Competitive Intelligence gathering is both a product and a process which comprises of some specific steps to handle data. These are data gathering, analysis, verification, and SECURITY.

40.

______________ is important to grab a quick understanding and analyzing about your competitors or target user’s need.(a) Competitive Intelligence gathering(b) Cognitive Intelligence gathering(c) Cyber Intelligence gathering(d) Competitors Info gatheringI had been asked this question during an online interview.My question is taken from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Right choice is (a) Competitive Intelligence GATHERING

To explain: In the world of data, where data is considered the oil and FUEL of MODERN TECHNOLOGY, Competitive Intelligence gathering is both a product and a process. Hackers are hired with skills for gathering competitive knowledge so that data analysts can analyze those for further understanding of PRODUCTS.

41.

Which of them is not a proper step in competitive intelligence data processing?(a) Data gathering(b) Data analysis(c) Information security(d) Network analysisThe question was asked in quiz.Query is from Information Gathering Phase & Techniques in section Phases of Security of Cyber Security

Answer»

Correct answer is (d) Network analysis

Explanation: In the world of data, where data is CONSIDERED the oil and FUEL of modern technology, Competitive Intelligence GATHERING is both a product and a process which comprises of some PREDEFINED steps to handle data. These are data gathering, analysis, verification, and security.

42.

You can attain a series of IP addresses allotted to a particular company using __________ site.(a) https://www.ipdata.org/(b) https://www.arin.net/(c) https://www.ipip.com/(d) https://www.goipaddr.net/This question was addressed to me in my homework.Enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security

Answer»

The correct CHOICE is (b) https://www.arin.net/

For explanation: Hackers can attain a SERIES of IP addresses allotted to a particular COMPANY USING https://www.arin.net/ site. Hackers can enter the company name in the search box for finding a list of all the assigned IP addresses.

43.

In the world of data, where data is considered the oil and fuel of modern technology _____________ is both a product and a process.(a) Competitive Intelligence gathering(b) Cognitive Intelligence gathering(c) Cyber Intelligence gathering(d) Competitors Info gatheringI got this question during an interview for a job.Question is from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Right answer is (a) COMPETITIVE Intelligence gathering

For EXPLANATION: In the world of data, where data is considered the oil and FUEL of MODERN technology, Competitive Intelligence gathering is both a PRODUCT and a process.

44.

The ______________ intelligence gathering is non-interfering & subtle in nature.(a) cognitive(b) competitive(c) cyber(d) concreteThe question was asked in an online quiz.I'd like to ask this question from Information Gathering Phase & Techniques topic in section Phases of Security of Cyber Security

Answer»

Correct ANSWER is (B) competitive

Easy explanation: Competitive Intelligence GATHERING is the term USED for gathering information about your competitors from online resources, RESEARCHES, and newsgroups. The competitive intelligence gathering is non-interfering & subtle in nature.

45.

____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups.(a) Competitive Intelligence gathering(b) Cognitive Intelligence gathering(c) Cyber Intelligence gathering(d) Competitors Info gatheringThe question was posed to me in an international level competition.Question is taken from Information Gathering Phase & Techniques topic in chapter Phases of Security of Cyber Security

Answer»

The CORRECT choice is (a) Competitive Intelligence gathering

Explanation: Competitive Intelligence gathering is the term used for gathering information about your competitors from online RESOURCES, researches, and NEWSGROUPS. The competitive intelligence gathering is non-interfering & SUBTLE in nature.

46.

Collecting freely available information over the internet is an example of ____________ type of information gathering.(a) active(b) passive(c) active & passive(d) non-passiveThis question was posed to me by my school principal while I was bunking the class.The doubt is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security

Answer»

Right answer is (b) passive

For explanation I would say: COLLECTING freely available information over the internet is an example of passive information gathering TECHNIQUE. It uses ARCHIVE sites, Google, domain name, PEOPLE search, Nslookup etc.

47.

Using spyware is an example of _________ type of information gathering.(a) active(b) passive(c) active & passive(d) non-passiveThis question was posed to me by my school teacher while I was bunking the class.My question is based upon Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Right answer is (a) active

The best I can explain: Using spyware is an EXAMPLE of an active information gathering technique. Spywares can be used to STEAL browsing HISTORY, browsing habits and other related searches from the attacker’s browser. Google CHROME itself has a search BOX in the address bar which the spyware might monitor to take search results as information for the attacker.

48.

ARIN is abbreviated as _____________(a) American Registry for Internet Numbers(b) American Registry for IP Numbers(c) All Registry for Internet Numbers(d) American Registry for IP NumberingI got this question during an internship interview.The question is from Information Gathering Phase & Techniques in division Phases of Security of Cyber Security

Answer» RIGHT choice is (a) AMERICAN Registry for Internet Numbers

Explanation: ARIN is abbreviated as American Registry for Internet Numbers. Hackers can attain a series of IP addresses allotted to a particular company using https://www.arin.net/ site. Hackers can enter the company NAME in the search box for finding a list of all the assigned IP addresses.
49.

Information about people is available people search sites. Which of them is an example of people data searching site?(a) people.com(b) indivinfo.org(c) intelius.com(d) peopleinfo.orgThis question was posed to me in a national level competition.Question is from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Right option is (c) intelius.com

The best EXPLANATION: Information about people is available people SEARCH sites. https://www.intelius.com/ is an example of such SITE which holds RECORDS of people’s information.

50.

https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date.(a) True(b) FalseI had been asked this question during an online exam.My doubt is from Information Gathering Phase & Techniques in section Phases of Security of Cyber Security

Answer»

Correct choice is (a) True

For explanation I would say: https://archive.org is a popular archive site where one can enter a domain name in its search box for finding out how the site was looking at a given date. It STORES all the details about the look and WORKING of the site, even when the site got updated.