Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 14

QUESTION 300 Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? A. Dsniff B. John the Ripper C. Snort D. Nikto Correct Answer:…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 13

QUESTION 277 Which of the following is the successor of SSL? A. GRE B. IPSec C. RSA D. TLS Correct Answer: D QUESTION 278 This international organization regulates billions of…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 12

QUESTION 254 Which of the following is assured by the use of a hash? A. Authentication B. Confidentially C. Availability D. Integrity Correct Answer: D QUESTION 255 Risks=Threats x Vulnerabilities…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 11

QUESTION 231 Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company? A. Voice B. Fingerprints C. Iris patterns D.…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 10

QUESTION 208 A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited,…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 9

QUESTION 185 What is the role of test automation in security testing? A. It is an option but it tends to be very expensive. B. It should be used exclusively.…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 8

QUESTION 162 Which of the following Nmap commands will produce the following output? A. nmap –sT –sX –Pn –p 1-65535 192.168.1.1 B. nmap –sN –Ps –T4 192.168.1.1 C. nmap –sS…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 7

QUESTION 139 An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next? A. He will create a…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 6

QUESTION 116 A virus that attempts to install itself inside the file it is infecting is called? A. Tunneling virus B. Cavity virus C. Polymorphic virus D. Stealth virus Correct…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 5

QUESTION 93 Which of the following security policies defines the use of VPN for gaining access to an internal corporate network? A. Network security policy B. Information protection policy C.…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 4

QUESTION 70 Based on the below log, which of the following sentences are true? Mar 1, 2016, 7:33:28 AM 10.240.250.23 – 54373 10.249.253.15 – 22 tcp_ip A. SSH communications are…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 3

QUESTION 47 The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 2

QUESTION 24 A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either…

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 1

QUESTION 1 An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed? A. Reverse…

Windows MCQ – 1 to 20 With Answers

1. Device A has been configured for IRQ 3. Which of the following devices will Device A potentially conflict with? A. COM1 B. LPT1 C. COM2 D. LPT2 2. What…

Computer Fundamentals MCQ with Answers – 35 Set

1. Which of the following components is not usually found on a motherboard? A. Hard drive controller B. DVD drive controller C. Memory D. Video adapter 2. What type of…

20 Basic Computer Questions With Answers

1. What was the original system board speed of the ATX board? A. 33 MHz B. 60 MHz C. 66 MHz D. 100 MHz 2. Which bus architecture supports 32-bit…

Cyber Security And Ethical hacking – MCQ With Answers – Part 4

Question 142. Which of the following is often one of the most overlooked areas of security? A. Operational B. Technical C. Internet D. Physical Answer 142. Option D. Explanation: Physical…

Cyber Security And Ethical hacking – MCQ With Answers – Part 3

Question 95. What is the Ping of Death? A. Sending packets that, when reassembled, are too large for the system to understand B. Sending very large packets that cause a…

Cyber Security And Ethical hacking – MCQ With Answers – Part 2

Question 48. What is the process of hiding text within an image called? A. Steganography B. Encryption C. Spyware D. Keystroke logging Answer 48. Option A. Explanation: Steganography is the…

Cyber Security And Ethical hacking – MCQ With Answers – Part 1

Question 1. Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker Answer 1. Option A.…

Computer RAM Questions with Answers – MCQ – 20 Set

1. Which of the following types of memory is used for cache memory? A. SRAM B. DRAM C. EDO RAM D. SDRAM 2. How many bits make up the data…

Hardware Basic Questions With Answers – 33 Set

1. You have a USB camera in which you are trying to copy some of the pictures to the computer’s hard disk. The computer does not seem to recognize the…

Computer Printer MCQ With Answers – 25 Set

1. What are the two types of paper feeder mechanisms? A. Continuous tractor feed B. Continuous form feed C. Friction feed D. Injected 2. What type of printer is most…

General Computer MCQ with Answers – 45 Questions

1. What is the size of a sector on a hard disk? A. 512K B. 1K C. 512 bytes D. 4K 2. How many devices can exist in an IDE…

General Computer MCQ – With Answers

1. Which type of memory cannot be upgraded without replacing a CPU? A. RAM B. L1 cache C. L2 cache D. None of the above 2. Which type of the…

40 Computer Multiple Choice Questions with Answers

1. What is the most popular category of portable PCs? A. Notebook B. Laptop C. Palmtop D. Suitcase computer 2. Which battery type is the best for a portable computer?…

Computer Questions for Competitive Exams – MCQ

1. The correct voltages in the PSU are: A. +5 VDC, –5 VDC, +10 VDC, –10 VDC B. +5 VDC, –5 VDC, +11 VDC, –11 VDC C. +5 VDC, –5…

Take the Online Safety Quiz 2017

Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations…

Linux – Multiple Choice Questions – MCQ – 391 to 420 Questions with Explanation

391. Which script is run when X Window starts? A. .xinit B. .xrc C. .startxrc D. .xinitrc Answer – – D Description – The .xinitrc script is run from your…