cyber security and element set 24

Que.How many primary ways are there for detecting buffer-overflow?
a. 6
b. 3
c. 2
d. 5
Que.Testing for buffer-overflow in a system can be done manually and has two possible ways.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Attackers commonly target ____________ for fetching IP address of a target or victim user.
a. websites
b. web pages
c. ip tracker
d. emails
Que.Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.
a. True
b. False
c. May be True or False
d. Can’t say
Que.What common web scripting languages are used by attackers to fetch various details from its surfing users?
a. Tcl and C#
b. C++ and HTML
c. HTML and Python
d. Perl and JavaScript
Que.______________ is the first phase of ethical hacking.
a. DNS poisoning
b. Footprinting
c. ARP-poisoning
d. Enumeration
Que.Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?
a. IP Tables
b. SNMP data, if not secured appropriately
c. Private chats
d. List of username and password policies
Que.Enumeration does not depend on which of the following services?
a. DNS enumeration
b. SNMP enumeration
c. NTP enumeration
d. HTTPS enumeration
Que.__________ suite is used for NTP enumeration.
a. DNS
b. NTP
Que.enum4linux is used to enumerate _______________
a. Linux systems
b. Windows systems
c. Chrome systems
d. Mac systems

Get code60