Cyber Security Questions and Answers – Enumerating in Cyber Security

This set of Cyber Security Question Paper focuses on “Enumerating in Cyber Security”.

1. Attackers commonly target ____________ for fetching IP address of a target or victim user.
a) websites
b) web pages
c) ip tracker
d) emails
View Answer

Answer: a
Explanation: Enumeration by cyber-attackers is possible through websites also, as the attackers target websites for fetching the IP address of the victim or the target user.

2. Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.
a) True
b) False
View Answer

Answer: a
Explanation: Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers. Enumeration by cyber-attackers is possible through websites also, as the attackers target websites for fetching the IP address of the victim or the target user.

3. What common web scripting languages are used by attackers to fetch various details from its surfing users?
a) Tcl and C#
b) C++ and HTML
c) HTML and Python
d) Perl and JavaScript
View Answer

Answer: d
Explanation: Various scripting languages are used by attackers, such as Perl and JavaScript, that are programmed to fetch not only the IP address from the site but also other user’s personal information.
advertisement
advertisement

4. ______________ is the first phase of ethical hacking.
a) DNS poisoning
b) Footprinting
c) ARP-poisoning
d) Enumeration
View Answer

Answer: b
Explanation: Footprinting is the first phase of Ethical Hacking where a gathering of information is done for the process of hacking or attacking any victim or system. Here that attacker tries to discover as much attack vectors as possible. Footprinting is also known as Reconnaissance.

5. Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?
a) IP Tables
b) SNMP data, if not secured appropriately
c) Private chats
d) List of username and password policies
View Answer

Answer: c
Explanation: Enumeration is an information gaining technique used in ethical hacking to achieve data regarding victim’s IP table, SNMP data, lists of username and passwords of different systems etc but not private chats.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Enumeration does not depend on which of the following services?
a) DNS enumeration
b) SNMP enumeration
c) NTP enumeration
d) HTTPS enumeration
View Answer

Answer: d
Explanation: Enumerations depend on the different services that the system offers. These services are – SMB enumeration, DNS enumeration, SNMP numeration, NTP enumeration, and Linux/Windows enumeration.

7. __________ suite is used for NTP enumeration.
a) DNS
b) NTP
c) HTTP
d) SNMP
View Answer

Answer: b
Explanation: NTP Suite is employed for NTP enumeration. This is significant for a network environment; where anyone can discover other primary servers which assist the hosts to update their time, and the entire process can be done without authenticating.
advertisement

8. enum4linux is used to enumerate _______________
a) Linux systems
b) Windows systems
c) Chrome systems
d) Mac systems
View Answer

Answer: a
Explanation: ‘enum4linux’ is implemented for enumerating the Linux systems. Using this, the attacker can examine and establish the usernames that are present in a target host.

9. ___________ is used that tries for guessing the usernames by using SMTP service.
a) smtp-user-enum
b) smtp-enum
c) snmp-enum
d) snmp-user-enum
View Answer

Answer: a
Explanation: smtp-user-enum is used that tries to guess the usernames by using SMTP service. Using this, an attacker can examine and establish the usernames that are present in a target host.
advertisement

10. To stop your system from getting enumerated, you have to disable all services.
a) True
b) False
View Answer

Answer: a
Explanation: To stop your system from getting enumerated, it is recommended to disable all services that are not in use. It lessens the potential of OS enumeration of your system.

11. Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email.
a) ‘forward’ option
b) ‘show original’ option
c) ‘Show full email’
d) ‘View Original’ option
View Answer

Answer: b
Explanation: It is possible to know the IP address of the sender of your email by opening the email and going to the ‘more’ button and then selecting the ‘show original’ option. In this way, one can find the IP address and do enumeration.

12. __________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.
Network enumeration is computing action used in which usernames & info about user-groups
a) Hardware enumeration
b) System enumeration
c) Network enumeration
d) Cloud enumeration
View Answer

Answer: c
Explanation: Network enumeration is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.

13. Network enumeration is the finding of __________ or devices on a network.
a) hosts
b) servers
c) network connection
d) cloud storage
View Answer

Answer: a
Explanation: Network enumeration is the detection of hosts or devices on a particular network. Network enumeration is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.

14. A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.
a) hardware enumerator
b) software enumerator
c) network enumerator
d) cloud enumerator
View Answer

Answer: c
Explanation: A network enumerator is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers. These type of programs are used for network enumeration in order to detect hosts or devices on a particular network.

15. Network enumerator is also known as ________________
a) hardware scanner
b) software enumerator
c) program enumerator
d) network scanner
View Answer

Answer: d
Explanation: Network enumerator is also known as Network scanner which is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all questions papers on Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.