InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which one of them is not a network scanner?(a) NMAP(b) Qualys(c) SoftPerfect(d) NetcatI had been asked this question by my school teacher while I was bunking the class.This interesting question is from Scanning Phase for Security topic in portion Phases of Security of Cyber Security |
|
Answer» RIGHT OPTION is (d) Netcat Best EXPLANATION: NMAP, Qualys, and SoftPerfect are all network scanning tools. Network scanning is USED for a computer network to gather information about the computing SYSTEMS. |
|
| 2. |
Which of them is not a vulnerability scanning tool?(a) Nexpose(b) Nessus Professional(c) Snort(d) Nikto Web scannerThe question was asked in an online interview.The doubt is from Scanning Phase for Security in chapter Phases of Security of Cyber Security |
|
Answer» Correct CHOICE is (c) Snort |
|
| 3. |
Which of them is not a port scanning tool?(a) Netcat(b) Unicornscan(c) Maltego(d) Angry IP ScannerThe question was posed to me in homework.I would like to ask this question from Scanning Phase for Security in section Phases of Security of Cyber Security |
|
Answer» The correct choice is (C) Maltego |
|
| 4. |
_________________ is quite an esoteric process for preventing session creation through a particular port.(a) Port knocking(b) Port cracking(c) Port hacking(d) Port-jackingI got this question in quiz.My question is from Scanning Phase for Security topic in chapter Phases of Security of Cyber Security |
|
Answer» The correct choice is (a) PORT knocking |
|
| 5. |
Which of the following is not a feature of Hping2 tool?(a) Firewall testing(b) Port scanning(c) Network testing(d) Server malware scanningThis question was posed to me in an online quiz.This interesting question is from Scanning Phase for Security in portion Phases of Security of Cyber Security |
|
Answer» The correct OPTION is (d) Server malware scanning |
|
| 6. |
How many standard flags are used in TCP communication?(a) 4(b) 5(c) 6(d) 7The question was posed to me in an interview.My query is from Scanning Phase for Security in section Phases of Security of Cyber Security |
|
Answer» Right OPTION is (c) 6 |
|
| 7. |
___________ is a command-line TCP/IP packet assembler and analyzer tool.(a) IGMP Ping(b) Hping2(c) Nmap(d) MaltegoI have been asked this question in an internship interview.Origin of the question is Scanning Phase for Security topic in chapter Phases of Security of Cyber Security |
|
Answer» Right answer is (b) Hping2 |
|
| 8. |
Which of the following is not a valid scanning method?(a) Xmas Tree scan(b) SYN Stealth scan(c) Null Scan(d) Cloud scanThe question was posed to me in an online interview.The doubt is from Scanning Phase for Security topic in division Phases of Security of Cyber Security |
|
Answer» CORRECT option is (d) CLOUD scan The explanation is: Some popular scanning methods USED for scanning connections and ports are – Xmas TREE scan, SYN Stealth Scan, NULL Scan, Window Scan, ACK scan, UDP scan etc. |
|
| 9. |
Which of them is not a standard flag used in TCP communication between client and server?(a) Synchronize(b) Acknowledgment(c) Finish(d) StartThis question was addressed to me in exam.Enquiry is from Scanning Phase for Security topic in chapter Phases of Security of Cyber Security |
|
Answer» The correct choice is (d) Start |
|
| 10. |
Using 3-way handshake, it is possible to check for open ports.(a) True(b) FalseThis question was posed to me in final exam.The question is from Scanning Phase for Security in chapter Phases of Security of Cyber Security |
|
Answer» CORRECT answer is (a) True Explanation: OPEN ports can be CHECKED where a COMPUTER initiates a connection to the server with SYN flag set. The server replies with both SYN & ACK flag set. Finally, the client responds back to the server with the ACK packet. |
|
| 11. |
Firewalk works by sending ________ & ________ packets.(a) UDP, HTTP(b) TCP, HTTP(c) ICMP, TCP(d) UDP, TCPI got this question in exam.The question is from Scanning Phase for Security in chapter Phases of Security of Cyber Security |
|
Answer» The correct CHOICE is (d) UDP, TCP |
|
| 12. |
Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.(a) filter, packet(b) filter, port(c) routing, packet(d) routing, portThis question was addressed to me at a job interview.Query is from Scanning Phase for Security in section Phases of Security of Cyber Security |
|
Answer» RIGHT option is (a) filter, packet Best explanation: Firewalk is a tool which uses traceroute-like TECHNIQUES for analyzing IP packet responses. It determines GATEWAY ACL and filters & map NETWORKS. Specifically, it determines filter RULES in place on all packet forwarding devices. |
|
| 13. |
In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.(a) address(b) port(c) system(d) networkThe question was posed to me in exam.My question comes from Scanning Phase for Security in portion Phases of Security of Cyber Security |
|
Answer» Correct choice is (b) PORT |
|
| 14. |
In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.(a) IP address, protocol(b) MAC address, protocol(c) IP address, IMEI number(d) MAC address, network modelI had been asked this question during an online exam.The origin of the question is Scanning Phase for Security in division Phases of Security of Cyber Security |
|
Answer» Right answer is (a) IP ADDRESS, protocol |
|
| 15. |
________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses.(a) Firewalk(b) Firesweep(c) PingSweeper(d) ICMPwalkerI have been asked this question in a national level competition.I would like to ask this question from Scanning Phase for Security topic in division Phases of Security of Cyber Security |
|
Answer» CORRECT option is (a) FIREWALK For explanation: Firewalk is a tool which is used traceroute-like TECHNIQUES for analysing IP packet responses. It determines gateway ACL and filters & map networks. Specifically, it determines filter rules in place on all packet forwarding devices. |
|
| 16. |
Which of them is not a standard scanning type or terminology?(a) Network(b) Port(c) Vulnerability(d) SystemThis question was posed to me by my college professor while I was bunking the class.I'd like to ask this question from Scanning Phase for Security topic in division Phases of Security of Cyber Security |
|
Answer» The correct choice is (d) System |
|
| 17. |
_____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.(a) Network(b) Port(c) Vulnerability(d) SystemThe question was posed to me in an interview for job.The question is from Scanning Phase for Security topic in portion Phases of Security of Cyber Security |
|
Answer» The correct OPTION is (c) Vulnerability |
|
| 18. |
____________ scanning is a procedure to identify active hosts on your network.(a) Network(b) Port(c) Vulnerability(d) SystemThis question was addressed to me by my school teacher while I was bunking the class.This intriguing question originated from Scanning Phase for Security topic in section Phases of Security of Cyber Security |
|
Answer» Right CHOICE is (a) Network |
|
| 19. |
If any given address is running live, it will return an ICMP ECHO reply.(a) True(b) FalseI got this question by my school principal while I was bunking the class.This interesting question is from Scanning Phase for Security in division Phases of Security of Cyber Security |
|
Answer» Right CHOICE is (a) True |
|
| 20. |
__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.(a) Network(b) Port(c) Vulnerability(d) SystemI have been asked this question in an online interview.Question is from Scanning Phase for Security in division Phases of Security of Cyber Security |
|
Answer» Right option is (b) Port |
|
| 21. |
Ping sweep is also known as ________________(a) ICMP Sweep(b) ICMP Call(c) IGMP Sweep(d) ICMP pingingI got this question in homework.Origin of the question is Scanning Phase for Security topic in section Phases of Security of Cyber Security |
|
Answer» Correct answer is (a) ICMP Sweep |
|
| 22. |
A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.(a) scan sweep(b) ping sweep(c) scan ping(d) host pingI had been asked this question in quiz.The question is from Scanning Phase for Security in section Phases of Security of Cyber Security |
|
Answer» The correct CHOICE is (b) ping sweep |
|
| 23. |
Which of them do not comes under NETBIOS information?(a) Name of the system / PC(b) Workgroup name(c) MAC address(d) RAM spaceI had been asked this question in homework.This intriguing question comes from Scanning Phase for Security in portion Phases of Security of Cyber Security |
|
Answer» Right choice is (d) RAM space |
|
| 24. |
In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.(a) True(b) FalseI have been asked this question in an online quiz.Question is from Scanning Phase for Security in division Phases of Security of Cyber Security |
|
Answer» The correct option is (a) True |
|
| 25. |
________ attribute is used to tweak the ping timeout value.(a) -time(b) -t(c) -p(d) -toutThis question was posed to me in an interview for internship.My doubt stems from Scanning Phase for Security in portion Phases of Security of Cyber Security |
|
Answer» Correct CHOICE is (B) -t |
|
| 26. |
ICMP scanning is used to scan _______________(a) open systems(b) live systems(c) malfunctioned systems(d) broken systemsThis question was posed to me in a job interview.Asked question is from Scanning Phase for Security topic in portion Phases of Security of Cyber Security |
|
Answer» Correct answer is (b) LIVE systems |
|
| 27. |
For discovering the OS running on the target system, the scanning has a specific term. What is it?(a) Footprinting(b) 3D Printing(c) Fingerprinting(d) screen-printingThe question was asked at a job interview.I'd like to ask this question from Scanning Phase for Security in section Phases of Security of Cyber Security |
|
Answer» RIGHT choice is (c) Fingerprinting To explain: Fingerprinting is the name of that specific type of SCANNING For discovering the OS running on the TARGET system in a network which comes under OS scanning technique. |
|
| 28. |
Which of them is not a scanning methodology?(a) Check for live systems(b) Check for open ports(c) Identifying the malware in the system(d) Identifying of servicesI have been asked this question by my school teacher while I was bunking the class.My question is from Scanning Phase for Security in division Phases of Security of Cyber Security |
|
Answer» Right option is (c) IDENTIFYING the malware in the system |
|
| 29. |
Which of the following is not an objective of scanning?(a) Detection of the live system running on network(b) Discovering the IP address of the target system(c) Discovering the services running on target system(d) Detection of spyware in a systemThis question was posed to me in quiz.My query is from Scanning Phase for Security topic in division Phases of Security of Cyber Security |
|
Answer» The correct choice is (d) Detection of spyware in a SYSTEM |
|
| 30. |
There are _______ types of scanning.(a) 2(b) 3(c) 4(d) 5This question was posed to me in unit test.Question is taken from Scanning Phase for Security topic in portion Phases of Security of Cyber Security |
|
Answer» Correct choice is (B) 3 |
|
| 31. |
Competitive Intelligence gathering is both a ___________ and a ____________(a) process, product(b) process, item(c) product & data to sell to 3rd party(d) data to sell to a 3rd party and a productI had been asked this question in an online interview.This intriguing question originated from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» The correct CHOICE is (a) process, product |
|
| 32. |
Using _____________ for doing competitive information gathering is a crime.(a) Spyware(b) Antivirus(c) Anti-malware(d) AdwareI got this question by my school principal while I was bunking the class.I'm obligated to ask this question of Information Gathering Phase & Techniques topic in division Phases of Security of Cyber Security |
|
Answer» Right answer is (a) Spyware |
|
| 33. |
Which of the following is not an example of a firm that provides info regarding competitive intelligence gathering?(a) Carratu International(b) CI Center(c) Microsoft CI(d) Marven Consulting GroupI have been asked this question by my college professor while I was bunking the class.Asked question is from Information Gathering Phase & Techniques topic in division Phases of Security of Cyber Security |
|
Answer» Correct choice is (c) Microsoft CI |
|
| 34. |
Which of the following is a site used for Competitive Intelligence gathering?(a) https://www.bidigital.gov/(b) https://www.cig.com/ci/(c) https://www.coginfo.com/ci/(d) https://www.bidigital.com/ci/This question was posed to me during an interview for a job.Question is from Information Gathering Phase & Techniques in section Phases of Security of Cyber Security |
|
Answer» Right ANSWER is (d) https://www.bidigital.com/ci/ |
|
| 35. |
Predict and analyze the tactics of competitors from data taken out from online data sources is a crime.(a) True(b) FalseI had been asked this question in final exam.I'd like to ask this question from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security |
|
Answer» Correct answer is (b) False |
|
| 36. |
Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake.(a) True(b) FalseI got this question in an online quiz.I want to ask this question from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security |
|
Answer» Correct choice is (a) True |
|
| 37. |
Which of them is not a reason for competitive information gathering?(a) Compare your product with competitors(b) Analyze the market position of yours with competitors(c) Fetching confidential plans about your competitors(d) Pull out a list of your competitive firms in the marketThis question was addressed to me in an internship interview.Query is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security |
|
Answer» Right ANSWER is (C) FETCHING confidential plans about your COMPETITORS |
|
| 38. |
There are __________ types of cognitive hacking and information gathering which is based on the source type, from where data is fetched.(a) 6(b) 5(c) 4(d) 3I have been asked this question in an online interview.Asked question is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security |
|
Answer» The correct option is (d) 3 |
|
| 39. |
Which one of the following is a proper step in competitive intelligence data processing?(a) Competitors’ data compromising(b) Data hacking(c) Data analysis(d) Competitors’ data stealingI have been asked this question in final exam.Enquiry is from Information Gathering Phase & Techniques topic in section Phases of Security of Cyber Security |
|
Answer» The CORRECT answer is (c) Data analysis |
|
| 40. |
______________ is important to grab a quick understanding and analyzing about your competitors or target user’s need.(a) Competitive Intelligence gathering(b) Cognitive Intelligence gathering(c) Cyber Intelligence gathering(d) Competitors Info gatheringI had been asked this question during an online interview.My question is taken from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Right choice is (a) Competitive Intelligence GATHERING |
|
| 41. |
Which of them is not a proper step in competitive intelligence data processing?(a) Data gathering(b) Data analysis(c) Information security(d) Network analysisThe question was asked in quiz.Query is from Information Gathering Phase & Techniques in section Phases of Security of Cyber Security |
|
Answer» Correct answer is (d) Network analysis |
|
| 42. |
You can attain a series of IP addresses allotted to a particular company using __________ site.(a) https://www.ipdata.org/(b) https://www.arin.net/(c) https://www.ipip.com/(d) https://www.goipaddr.net/This question was addressed to me in my homework.Enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security |
|
Answer» The correct CHOICE is (b) https://www.arin.net/ |
|
| 43. |
In the world of data, where data is considered the oil and fuel of modern technology _____________ is both a product and a process.(a) Competitive Intelligence gathering(b) Cognitive Intelligence gathering(c) Cyber Intelligence gathering(d) Competitors Info gatheringI got this question during an interview for a job.Question is from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Right answer is (a) COMPETITIVE Intelligence gathering |
|
| 44. |
The ______________ intelligence gathering is non-interfering & subtle in nature.(a) cognitive(b) competitive(c) cyber(d) concreteThe question was asked in an online quiz.I'd like to ask this question from Information Gathering Phase & Techniques topic in section Phases of Security of Cyber Security |
|
Answer» Correct ANSWER is (B) competitive |
|
| 45. |
____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups.(a) Competitive Intelligence gathering(b) Cognitive Intelligence gathering(c) Cyber Intelligence gathering(d) Competitors Info gatheringThe question was posed to me in an international level competition.Question is taken from Information Gathering Phase & Techniques topic in chapter Phases of Security of Cyber Security |
|
Answer» The CORRECT choice is (a) Competitive Intelligence gathering |
|
| 46. |
Collecting freely available information over the internet is an example of ____________ type of information gathering.(a) active(b) passive(c) active & passive(d) non-passiveThis question was posed to me by my school principal while I was bunking the class.The doubt is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security |
|
Answer» Right answer is (b) passive |
|
| 47. |
Using spyware is an example of _________ type of information gathering.(a) active(b) passive(c) active & passive(d) non-passiveThis question was posed to me by my school teacher while I was bunking the class.My question is based upon Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Right answer is (a) active |
|
| 48. |
ARIN is abbreviated as _____________(a) American Registry for Internet Numbers(b) American Registry for IP Numbers(c) All Registry for Internet Numbers(d) American Registry for IP NumberingI got this question during an internship interview.The question is from Information Gathering Phase & Techniques in division Phases of Security of Cyber Security |
|
Answer» RIGHT choice is (a) AMERICAN Registry for Internet Numbers Explanation: ARIN is abbreviated as American Registry for Internet Numbers. Hackers can attain a series of IP addresses allotted to a particular company using https://www.arin.net/ site. Hackers can enter the company NAME in the search box for finding a list of all the assigned IP addresses. |
|
| 49. |
Information about people is available people search sites. Which of them is an example of people data searching site?(a) people.com(b) indivinfo.org(c) intelius.com(d) peopleinfo.orgThis question was posed to me in a national level competition.Question is from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Right option is (c) intelius.com |
|
| 50. |
https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date.(a) True(b) FalseI had been asked this question during an online exam.My doubt is from Information Gathering Phase & Techniques in section Phases of Security of Cyber Security |
|
Answer» Correct choice is (a) True |
|