Q&A

Cyber Security & Penetration Testing Multiple Choice Questions

1. A process is nothing but a running instance of a program. True or False? a. True b. False 2. Which of the following Linux commands is used to check files opened by current user? a. crontab b. ls -l c. lsof d. dir 3. Which of the following files in Linux is used to […]

Q&A

[Penetration Testing] Top 70 Most Interview Questions

As you prepare for your pentester interview, you may be considering which questions the employer is going to ask you. While there’s no way to know for sure what topics will be covered because information security is a huge field, there are several popular interview questions you can expect to be asked. Being a pentester […]

Q&A

CCNA Interview Questions – Part 5

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 81: Explain the basic steps involved in converging a link state inter network. Answer: Each router floods a link state information advertisement describing its links, the states of its links, and any neighboring routers connected to those links, throughout the […]

Q&A

CCNA Interview Questions – Part 4

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 61: What is a summary route? In the context of static routing, how are summary routes useful? Answer: A summary route is a single route entry that points to multiple subnets or major IP addresses. In the context of static […]

Q&A

CCNA Interview Questions – Part 3

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 41: What is fragmentation? What fields of the IP header are used for fragmentation? Answer: Routers perform fragmentation when a packet is longer than the maximum packet length (Maximum Transmission Unit, or MTU) supported by a data link onto which […]

Q&A

CCNA Interview Questions – Part 2

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 21: What is the primary purpose of a LAN? Answer: The primary purpose of a local-area network is to allow resource sharing. The resources may be devices, applications, or information. Examples of shared resources are files, databases, e-mail, modems, and […]

Q&A

CCNA Interview Questions – Part 1

Part 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 1: Which layer of the OSI model is responsible for reliable connections? Answer: The Transport layer of the OSI model is responsible for reliable connections. Question 2: What is the difference between acknowledgements and handshaking? Answer: Handshaking is used to […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 4

Question 142. Which of the following is often one of the most overlooked areas of security? A. Operational B. Technical C. Internet D. Physical Answer 142. Option D. Explanation: Physical security is one of the most overlooked areas of security. Question 143. A hacker who plants a rogue wireless access point on a network in […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 3

Question 95. What is the Ping of Death? A. Sending packets that, when reassembled, are too large for the system to understand B. Sending very large packets that cause a buffer overflow C. Sending packets very quickly to fill up the receiving buffer D. Sending TCP packet with the fragment offset out of bounds Answer […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 2

Question 48. What is the process of hiding text within an image called? A. Steganography B. Encryption C. Spyware D. Keystroke logging Answer 48. Option A. Explanation: Steganography is the process of hiding text within an image. Question 49. What is a rootkit? A. A simple tool to gain access to the root of the […]

Q&A

Cyber Security And Ethical hacking – MCQ With Answers – Part 1

Question 1. Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker Answer 1. Option A. Explanation: A white-hat hacker is a “good” guy who uses his skills for defensive purposes. Question 2. A security audit performed on the internal network […]

Q&A

Top 40 XSS (Cross Site Scripting) Revision Questions with Answers

The below questions and answers are designed to both measure your understanding of the concepts of XSS -Cross Site Scripting Attacks and Prevention. Q1: What is the difference between HTML Injection and XSS? A: Both of them refer to exactly the same thing. In one of the situations, the attacker injected valid HTML tags, while […]

Q&A

Linux – Multiple Choice Questions – MCQ – 391 to 420 Questions with Explanation

391. Which script is run when X Window starts? A. .xinit B. .xrc C. .startxrc D. .xinitrc Answer – – D Description – The .xinitrc script is run from your home directory when startx is called. The other script names are invalid. 392. Which command adds a new default route to the system? A. ifconfig […]

Q&A

Linux – Multiple Choice Questions – MCQ – 361 to 390 Questions with Explanation

361. You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information? A. man syslog 3 B. man syslog -3 C. man -3 syslog D. man 3 syslog Answer – – D Description – The man page can be specified […]