Phases of Security MCQ part-6

In this MCQ, we will explore the different phases of security. We will discuss the importance of each phase and how they work together to create a secure environment. We will also explore the different types of security threats and how to mitigate them.

Que.Which of them is not a scanning methodology?
a. Check for live systems
b. Check for open ports
c. Identifying the malware in the system
d. Identifying of services
Que.ICMP scanning is used to scan _______________
a. open systems
b. live systems
c. malfunctioned systems
d. broken systems
Que.In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.
a. True
b. False
c. May be True or False
d. Can’t say
Que.________ attribute is used to tweak the ping timeout value.
a. -time
b. -t
c. -p
d. -tout
Que.Which of them do not comes under NETBIOS information?
a. Name of the system / PC
b. Workgroup name
c. MAC address
d. RAM space
Que.A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.
a. scan sweep
b. ping sweep
c. scan ping
d. host ping
Que.If any given address is running live, it will return an ICMP ECHO reply.
a. True
b. False
c. May be True or False
d. Can’t say
Que.__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.
a. Network
b. Port
c. Vulnerability
d. System
Que.____________ scanning is a procedure to identify active hosts on your network.
a. Network
b. Port
c. Vulnerability
d. System
Que._____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.
a. Network
b. Port
c. Vulnerability
d. System