Cyber Security Multiple Choice Questions on “Scanning Phase for Security”.
1. There are _______ types of scanning.
a) 2
b) 3
c) 4
d) 5
Answer: b
Clarification: There are a total of three types of scanning in ethical hacking and cyber-security. These are vulnerability scanning, network scanning & port scanning.
2. Which of the following is not an objective of scanning?
a) Detection of the live system running on network
b) Discovering the IP address of the target system
c) Discovering the services running on target system
d) Detection of spyware in a system
Answer: d
Clarification: Detection of the live system running on the network, discovering the IP address of the target system, & discovering the services running on the target system are some of the objectives of scanning.
3. For discovering the OS running on the target system, the scanning has a specific term. What is it?
a) Footprinting
b) 3D Printing
c) Fingerprinting
d) screen-printing
Answer: c
Clarification: Fingerprinting is the name of that specific type of scanning For discovering the OS running on the target system in a network which comes under OS scanning technique.
4. Which of them is not a scanning methodology?
a) Check for live systems
b) Check for open ports
c) Identifying the malware in the system
d) Identifying of services
Answer: c
Clarification: Check for live systems, open ports and identification of services running on the systems are some of the steps and methodologies used in scanning.
5. ICMP scanning is used to scan _______________
a) open systems
b) live systems
c) malfunctioned systems
d) broken systems
Answer: b
Clarification: Check for live systems, open ports and identification of services running on the systems are some of the steps and methodologies used in scanning. ICMP scanning is used for checking live systems.
6. In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.
a) True
b) False
Answer: a
Clarification: Check for live systems, open ports and identification of services running on the systems are some of the steps and methodologies used in scanning. In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.
7. ________ attribute is used to tweak the ping timeout value.
a) -time
b) -t
c) -p
d) -tout
Answer: b
Clarification: -t attribute is used while pinging any system to tweak the ping timeout value. It is an example of live system scanning, to check which hosts are up in the network by pinging the systems in the network.
8. Which of them do not comes under NETBIOS information?
a) Name of the system / PC
b) Workgroup name
c) MAC address
d) RAM space
Answer: d
Clarification: Scanning using IP address simply pings each IP address for checking if it is live or not. This helps in providing NETBIOS information such as the name of the system, workgroup and MAC address.
9. A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.
a) scan sweep
b) ping sweep
c) scan ping
d) host ping
Answer: b
Clarification: A ping sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.
10. Ping sweep is also known as ________________
a) ICMP Sweep
b) ICMP Call
c) IGMP Sweep
d) ICMP pinging
Answer: a
Clarification: Ping sweep is also known as ICMP sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.
11. If any given address is running live, it will return an ICMP ECHO reply.
a) True
b) False
Answer: a
Clarification: ICMP sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests. If any given address is running live, it will return an ICMP ECHO reply.
12. __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.
a) Network
b) Port
c) Vulnerability
d) System
Answer: b
Clarification: Scanning is done when a series of messages are sent by someone keeping in mind to break into a computer to learn about computer network services.
13. ____________ scanning is a procedure to identify active hosts on your network.
a) Network
b) Port
c) Vulnerability
d) System
Answer: a
Clarification: Network scanning is a procedure to identify active hosts on your network. It is done with the intention to either attack your system or for security purposes by ethical hackers.
14. _____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.
a) Network
b) Port
c) Vulnerability
d) System
Answer: c
Clarification: Vulnerability scanning is an automatic process for identifying vulnerabilities of a computing system within a network. It is one of the popular scanning methodologies.
15. Which of them is not a standard scanning type or terminology?
a) Network
b) Port
c) Vulnerability
d) System
Answer: d
Clarification: There are a total of three types of scanning in ethical hacking and cyber-security. These are vulnerability scanning, network scanning & port scanning. System scanning is not a standard terminology or type of scanning.