Cyber Security Questions and Answers – Scanning Phase for Security – 1

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Scanning Phase for Security – 1”.

1. There are _______ types of scanning.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: b
Explanation: There are a total of three types of scanning in ethical hacking and cyber-security. These are vulnerability scanning, network scanning & port scanning.

2. Which of the following is not an objective of scanning?
a) Detection of the live system running on network
b) Discovering the IP address of the target system
c) Discovering the services running on target system
d) Detection of spyware in a system
View Answer

Answer: d
Explanation: Detection of the live system running on the network, discovering the IP address of the target system, & discovering the services running on the target system are some of the objectives of scanning.

3. For discovering the OS running on the target system, the scanning has a specific term. What is it?
a) Footprinting
b) 3D Printing
c) Fingerprinting
d) screen-printing
View Answer

Answer: c
Explanation: Fingerprinting is the name of that specific type of scanning For discovering the OS running on the target system in a network which comes under OS scanning technique.
advertisement
advertisement

4. Which of them is not a scanning methodology?
a) Check for live systems
b) Check for open ports
c) Identifying the malware in the system
d) Identifying of services
View Answer

Answer: c
Explanation: Check for live systems, open ports and identification of services running on the systems are some of the steps and methodologies used in scanning.

5. ICMP scanning is used to scan _______________
a) open systems
b) live systems
c) malfunctioned systems
d) broken systems
View Answer

Answer: b
Explanation: Check for live systems, open ports and identification of services running on the systems are some of the steps and methodologies used in scanning. ICMP scanning is used for checking live systems.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.
a) True
b) False
View Answer

Answer: a
Explanation: Check for live systems, open ports and identification of services running on the systems are some of the steps and methodologies used in scanning. In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.

7. ________ attribute is used to tweak the ping timeout value.
a) -time
b) -t
c) -p
d) -tout
View Answer

Answer: b
Explanation: -t attribute is used while pinging any system to tweak the ping timeout value. It is an example of live system scanning, to check which hosts are up in the network by pinging the systems in the network.
advertisement

8. Which of them do not comes under NETBIOS information?
a) Name of the system / PC
b) Workgroup name
c) MAC address
d) RAM space
View Answer

Answer: d
Explanation: Scanning using IP address simply pings each IP address for checking if it is live or not. This helps in providing NETBIOS information such as the name of the system, workgroup and MAC address.

9. A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.
a) scan sweep
b) ping sweep
c) scan ping
d) host ping
View Answer

Answer: b
Explanation: A ping sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.
advertisement

10. Ping sweep is also known as ________________
a) ICMP Sweep
b) ICMP Call
c) IGMP Sweep
d) ICMP pinging
View Answer

Answer: a
Explanation: Ping sweep is also known as ICMP sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.

11. If any given address is running live, it will return an ICMP ECHO reply.
a) True
b) False
View Answer

Answer: a
Explanation: ICMP sweep is a simple network scanning technique used for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests. If any given address is running live, it will return an ICMP ECHO reply.

12. __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.
a) Network
b) Port
c) Vulnerability
d) System
View Answer

Answer: b
Explanation: Scanning is done when a series of messages are sent by someone keeping in mind to break into a computer to learn about computer network services.

13. ____________ scanning is a procedure to identify active hosts on your network.
a) Network
b) Port
c) Vulnerability
d) System
View Answer

Answer: a
Explanation: Network scanning is a procedure to identify active hosts on your network. It is done with the intention to either attack your system or for security purposes by ethical hackers.

14. _____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.
a) Network
b) Port
c) Vulnerability
d) System
View Answer

Answer: c
Explanation: Vulnerability scanning is an automatic process for identifying vulnerabilities of a computing system within a network. It is one of the popular scanning methodologies.

15. Which of them is not a standard scanning type or terminology?
a) Network
b) Port
c) Vulnerability
d) System
View Answer

Answer: d
Explanation: There are a total of three types of scanning in ethical hacking and cyber-security. These are vulnerability scanning, network scanning & port scanning. System scanning is not a standard terminology or type of scanning.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.