MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Cyber Security
Cyber Security Interview
Quiz 1
1
2
3
4
5
6
7
8
Q.1
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
a) security officer
b) malicious hacker
c) security auditor
d) network analyst
Q.2
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
a) Scanning
b) Maintaining access
c) Maintaining Access
d) Gaining access
Q.3
_______ is the tool used for this purpose.
a) Powersploit
b) Aircrack – ng
c) Snort
d) Nmap
Q.4
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
a) Rootkits
b) Backdoors
c) Trojans
d) Wireshark
Q.5
In _______ phase, the hackers try to hide their footprints.
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Gaining access
Q.6
Which of them is not a track clearing technique?
a) Altering log files
b) Tunnelling
c) Port Scanning
d) Footprint removing
Q.7
__________ is the last phase of ethical hacking process.
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Reporting
Q.8
Which of the following is not a footprint-scanning tool?
a) SuperScan
b) TcpView
c) Maltego
d) OWASP Zed
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)