Phases of Security MCQ part-7

In this MCQ, we will explore the different phases of security. We will discuss the importance of each phase and how they work together to create a secure environment. We will also explore the different types of security threats and how to mitigate them.

Que.Which of them is not a standard scanning type or terminology?
a. Network
b. Port
c. Vulnerability
d. System
Que.In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.
a. IP address, protocol
b. MAC address, protocol
c. IP address, IMEI number
d. MAC address, network model
Que.________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses.
a. Firewalk
b. Firesweep
c. PingSweeper
d. ICMPwalker
Que.In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.
a. address
b. port
c. system
d. network
Que.Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.
a. filter, packet
b. filter, port
c. routing, packet
d. routing, port
Que.Firewalk works by sending ________ & ________ packets.
Que.Using 3-way handshake, it is possible to check for open ports.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of them is not a standard flag used in TCP communication between client and server?
a. Synchronize
b. Acknowledgment
c. Finish
d. Start
Que.How many standard flags are used in TCP communication?
a. 4
b. 5
c. 6
d. 7
Que.Which of the following is not a valid scanning method?
a. Xmas Tree scan
b. SYN Stealth scan
c. Null Scan
d. Cloud scan
Que.___________ is a command-line TCP/IP packet assembler and analyzer tool.
a. IGMP Ping
b. Hping2
c. Nmap
d. Maltego
Que.Which of the following is not a feature of Hping2 tool?
a. Firewall testing
b. Port scanning
c. Network testing
d. Server malware scanning
Que._________________ is quite an esoteric process for preventing session creation through a particular port.
a. Port knocking
b. Port cracking
c. Port hacking
d. Port-jacking
Que.Which one of them is not a network scanner?
b. Qualys
c. SoftPerfect
d. Netcat
Que.Which of them is not a port scanning tool?
a. Netcat
b. Unicornscan
c. Maltego
d. Angry IP Scanner
Que.Which of them is not a vulnerability scanning tool?
a. Nexpose
b. Nessus Professional
c. Snort
d. Nikto Web scanner