cyber security and element set 27

Que.Which of the following do not comes under the important element of OS fingerprinting?
a. TTL
b. TOS
c. DF bits
d. Firewall
Que.By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.
a. True
b. False
c. May be True or False
d. Can’t say
Que.______________ is a common tool used for doing OS fingerprinting.
a. Hping
b. Wireshark
c. Nmap
d. Nessus
Que.To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server.
a. True
b. False
c. May be True or False
d. Can’t say
Que.A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.
a. ping-based hacking
b. ping sweep
c. ping-range
d. pinging
Que.Ping sweep is also known as ________________
a. ICMP sweep
b. SNMP sweep
c. SGNP sweep
d. SICMP sweep
Que.The _____________ command is used on Linux for getting the DNS and host-related information.
a. dnslookup
b. lookup
c. nslookup
d. infolookup
Que.___________________ is the method used to locate all the DNS-servers and their associated records for an organization.
a. DNS enumeration
b. DNS hacking
c. DNS cracking
d. DNS server hacking
Que.Which of the following operations DNSenum cannot perform?
a. Perform reverse lookups
b. Get the host’s addresses
c. Get extra names and sub-domains through Google scraping
d. Get the admin password
Que.The configuration of DNS needs to be done in a secure way.
a. True
b. False
c. May be True or False
d. Can’t say