1.
In Cyber Security, which of these tasks is performed by NMap in the following command:
NMap -sn 192.168.0.1-99
2.
In Cyber Security, you are conducting a network security assessment. You want to identify the operating systems of all devices connected to the network. You run following NMap command:
Nmap -T4 -O 192.168.1.1/24
You get an error QUITTING. What is the issue?
3.
In Cyber Security, which of the following PHP configuration files is referred by the auditors while auditing a website?
4.
In Cyber Security, which of the following is obtained when you try to penetrate a website with SQL injection attack?
5.
In Cyber Security, which of the following tools is used to hide registry values, files, processes, and record keystrokes?
6.
In Cyber Security, which of the following is a disadvantage if automated vulnerability scanner is used?
7.
In Cyber Security, what is a buffer overflow attack?
8.
In Cyber Security, which of the following information sources gives access to usernames, passwords, and location of CGI scripts?
9.
In Cyber Security, which of the following steps will you take to find the OS type and version if it is missing from the list of open ports during an OS scan on a web server?
10.
In Cyber Security, which of the following techniques is effective to bypass the network intrusion detection?