in Education by
________ attribute is used to tweak the ping timeout value. (a) -time (b) -t (c) -p (d) -tout This question was posed to me in an interview for internship. My doubt stems from Scanning Phase for Security in portion Phases of Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf, Cyber Security questions and solutions, Cyber Security mcq Test , Interview Cyber Security questions, Data Science Questions for Interview, Cyber Security MCQ (Multiple Choice Questions),Core Cyber Security Questions, Core Cyber Security MCQ,core Cyber Security interview questions for experiencedcore Cyber Security interview questions for 3 years experience,Cyber Security programming questions,core Cyber Security interview questions for freshers,Data Science interview questions and answers for freshers, Cyber Security programming questions and answers pdf, Cyber Security interview questions for beginnersCyber Security-Tutorial-for-Beginners,What-is-Cyber Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications

1 Answer

0 votes
by
 
Best answer
Correct choice is (b) -t To elaborate: -t attribute is used while pinging any system to tweak the ping timeout value. It is an example of live system scanning, to check which hosts are up in the network by pinging the systems in the network.

Related questions

0 votes
    Ping sweep is also known as ________________ (a) ICMP sweep (b) SNMP sweep (c) SGNP sweep (d) SICMP sweep ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Ping sweep is also known as ________________ (a) ICMP Sweep (b) ICMP Call (c) IGMP Sweep (d) ICMP ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    There are ________ types of cryptographic techniques used in general. (a) 2 (b) 3 (c) 4 (d) 5 I ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Hackers who help in finding bugs and vulnerabilities in a system & don't intend to crack a system are termed as ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ________ are the combination of both white as well as black hat hackers. (a) Grey Hat hackers (b) Green Hat ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    The full form of Malware is ________ (a) Malfunctioned Software (b) Multipurpose Software (c) Malicious Software (d) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    CIA triad is also known as ________ (a) NIC (Non-repudiation, Integrity, Confidentiality) (b) AIC (Availability, ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ________ phase in ethical hacking is known as the pre-attack phase. (a) Reconnaissance (b) Scanning (c) Gaining ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    In a phishing, attackers target the ________ technology to so social engineering. (a) Emails (b) WI-FI network ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ________ is the ability of an individual to gain physical access to an authorized area. (a) Network accessing (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    SFTP is abbreviated as ________ (a) Secure File Transfer Protocol (b) Secured File Transfer Protocol (c) Secure Folder ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    PCT is abbreviated as ________ (a) Private Connecting Technology (b) Personal Communication Technology (c) Private Communication ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...