Phases on Cyber Security related Questions and Answers - Page 3

Question 21 : Ping sweep is also known as ________________
1. ICMP Sweep
2. ICMP Call
3. IGMP Sweep
4. ICMP pinging
View Answer   Discuss with Members

Question 22 : A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.
1. scan sweep
2. ping sweep
3. scan ping
4. host ping
View Answer   Discuss with Members

Question 23 : Which of them do not comes under NETBIOS information?
1. Name of the system / PC
2. Workgroup name
3. MAC address
4. RAM space
View Answer   Discuss with Members

Question 24 : ________ attribute is used to tweak the ping timeout value.
1. -time
2. -t
3. -p
4. -tout
View Answer   Discuss with Members

Question 25 : In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.
1. True
2. False
3.
4.
View Answer   Discuss with Members

Question 26 : ICMP scanning is used to scan _______________
1. open systems
2. live systems
3. malfunctioned systems
4. broken systems
View Answer   Discuss with Members

Question 28 : For discovering the OS running on the target system, the scanning has a specific term. What is it?
1. Footprinting
2. 3D Printing
3. Fingerprinting
4. screen-printing
View Answer   Discuss with Members

Question 30 : There are _______ types of scanning.
1. 2
2. 3
3. 4
4. 5
View Answer   Discuss with Members


View 21 - 30 of 61 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter