Q&A

Cyber Security & Penetration Testing Multiple Choice Questions

1. A process is nothing but a running instance of a program. True or False? a. True b. False 2. Which of the following Linux commands is used to check files opened by current user? a. crontab b. ls -l c. lsof d. dir 3. Which of the following files in Linux is used to […]

Q&A

[Penetration Testing] Top 70 Most Interview Questions

As you prepare for your pentester interview, you may be considering which questions the employer is going to ask you. While there’s no way to know for sure what topics will be covered because information security is a huge field, there are several popular interview questions you can expect to be asked. Being a pentester […]

Q&A

CCNA Interview Questions – Part 5

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 81: Explain the basic steps involved in converging a link state inter network. Answer: Each router floods a link state information advertisement describing its links, the states of its links, and any neighboring routers connected to those links, throughout the […]

Q&A

CCNA Interview Questions – Part 4

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 61: What is a summary route? In the context of static routing, how are summary routes useful? Answer: A summary route is a single route entry that points to multiple subnets or major IP addresses. In the context of static […]

Q&A

CCNA Interview Questions – Part 3

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 41: What is fragmentation? What fields of the IP header are used for fragmentation? Answer: Routers perform fragmentation when a packet is longer than the maximum packet length (Maximum Transmission Unit, or MTU) supported by a data link onto which […]

Q&A

CCNA Interview Questions – Part 2

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 21: What is the primary purpose of a LAN? Answer: The primary purpose of a local-area network is to allow resource sharing. The resources may be devices, applications, or information. Examples of shared resources are files, databases, e-mail, modems, and […]

Q&A

CCNA Interview Questions – Part 1

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 1: Which layer of the OSI model is responsible for reliable connections? Answer: The Transport layer of the OSI model is responsible for reliable connections. Question 2: What is the difference between acknowledgements and handshaking? Answer: Handshaking is used to […]

Q&A

Top 15 IT Security Interview Questions For Infosec

There are certain requirements that you must meet in order to be an effective penetration tester in a infosec job role. The requirements deal with your level of security skills, your systems and network knowledge, the depth and breadth of tools at your disposal, and the OS and hardware on which you use them. Also […]

Q&A

Windows MCQ – 1 to 20 With Answers

1. Device A has been configured for IRQ 3. Which of the following devices will Device A potentially conflict with? A. COM1 B. LPT1 C. COM2 D. LPT2 2. What is the default IO address assigned to COM1? A. 02F8 B. 0378 C. 03F8 D. 0278 3. Which of the following best describes DMA? A. […]

Q&A

Computer Fundamentals MCQ with Answers – 35 Set

1. Which of the following components is not usually found on a motherboard? A. Hard drive controller B. DVD drive controller C. Memory D. Video adapter 2. What type of memory is not usually found on a motherboard? A. CMOS memory B. L1 Cache C. L2 Cache D. DIMM 3. The power supply converts 110 […]

Q&A

20 Basic Computer Questions With Answers

1. What was the original system board speed of the ATX board? A. 33 MHz B. 60 MHz C. 66 MHz D. 100 MHz 2. Which bus architecture supports 32-bit / 64-bit cards and transfers information at 33 MHz? A. ISA B. EISA C. AGP D. PCI 3. Which motherboard component is responsible for charging […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 4

Question 142. Which of the following is often one of the most overlooked areas of security? A. Operational B. Technical C. Internet D. Physical Answer 142. Option D. Explanation: Physical security is one of the most overlooked areas of security. Question 143. A hacker who plants a rogue wireless access point on a network in […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 3

Question 95. What is the Ping of Death? A. Sending packets that, when reassembled, are too large for the system to understand B. Sending very large packets that cause a buffer overflow C. Sending packets very quickly to fill up the receiving buffer D. Sending TCP packet with the fragment offset out of bounds Answer […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 2

Question 48. What is the process of hiding text within an image called? A. Steganography B. Encryption C. Spyware D. Keystroke logging Answer 48. Option A. Explanation: Steganography is the process of hiding text within an image. Question 49. What is a rootkit? A. A simple tool to gain access to the root of the […]