Cyber Security (3150714) MCQs

MCQs of Systems Vulnerability Scanning

Showing 11 to 13 out of 13 Questions
11.

_____________ is a special type of vulnerability that doesn’t possess risk.

(a)

Vulnerabilities without risk

(b)

Vulnerabilities without attacker

(c)

Vulnerabilities without action

(d)

Vulnerabilities no one knows

Answer:

Option (a)

12.

__________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.

(a)

Malware

(b)

Trojan

(c)

Worms

(d)

Exploit

Answer:

Option (d)

13.

What is Probe?

(a)

A probe is an attempt to gain access to a computer and its files through a known or probable weak point in the computer system. 

(b)

It is a method of checking if the computer is connected to a network.

(c)

A technique used to gain information about a computer system on a network and the services running on its open ports. 

(d)

A technique which is used to scan network.

Answer:

Option (a)

Showing 11 to 13 out of 13 Questions