Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data
Last Answer : a. Identifying weakness in computer system or networks
Last Answer : d. Protocols of corrupting data
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking
Last Answer : d. Remote networking
Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off
Last Answer : c. To overload a system so it is no longer operational
Description : An organisation’s ability or capacity to deploy or exploit resources is known as _______ Select one: a. All of these b. Capability c. Weaknesses of firm d. Strengths of firm
Last Answer : Capability
Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill
Last Answer : a. Art
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these
Last Answer : b. Weakness
Description : Vulnerability scanning in Ethical hacking finds_____. A. Strengths. B. Weakness. C. A &B D. None of these.
Last Answer : B. Weakness.
Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism
Last Answer : c) Ethical hacking
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________. a. Cracking b. Analysis c. Hacktivism d. Exploitation
Last Answer : d. Exploitation
Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : What were some of the problems faced by the young nation and why was a new constitution needed after identifying weaknesses of the Articles of Confederation?
Last Answer : Need answer
Description : Developing a vision and mission, identifying an organization's external opportunities and threats, and determining internal strengths and weaknesses are all __________ activities. a. strategy-formulation b. strategy-implementation c. long-range planning d. short-range planning
Last Answer : strategy-formulation
Description : Developing a Vision and Mission, identifying an Organization’s external opportunities & threats and determining internal strengths & weaknesses are all -------------- activities : A. Strategy Formulation B. Strategy Implementation C. Long-range Planning D. Short-range Planning
Last Answer : Strategy Formulation
Description : Achievement tests are commonly used for the purpose of: (A) Assessing the amount of learning after teaching (B) Making selections for a specific job (C) Selecting candidates for a course (D) Identifying strengths and weaknesses of learners
Last Answer : (A) Assessing the amount of learning after teaching
Description : Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these
Last Answer : b) Weakness
Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking
Last Answer : b. Spoofing
Description : 8. The common name for the crime of stealing passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking
Description : The local swelling of a finished plaster, is termed (A) Cracking (B) Dubbing (C) Blistering (D) Hacking
Last Answer : Answer: Option C
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : A doctor advises a patient to take plenty of citrus fruits, guavas, tomatoes and amlas over a period of two months regularly. What do you think is the complaint of the patient? (a) Softness and ... skin of angle of mouth (d) Extreme weakness, swelling and pain in legs, loss of appetite, headache
Last Answer : Ans:(b)
Description : Exploration of a phone network without authorization is known as a. Scripting b. Phreaking c. Phone hacking d. Call tracing
Last Answer : b. Phreaking
Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning
Last Answer : D. Reconnaissance
Description : . What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance
Description : What is the first phase of hacking? Maintaining access Gaining access Reconnaissance Scanning
Last Answer : Scanning
Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning
Last Answer : e. Scanning
Description : what is the first phase of hacking (a) attack (b) maintaining access (c) gaining access (d) reconnaissance
Last Answer : (d) reconnaissance
Description : What is the first phase of hacking? ∙ A. Attack ∙ B. Maintaining access ∙ C. Gaining access ∙ D. Reconnaissance
Description : What is cybersecurity?
Last Answer : Cybersecurity is the practice of protecting computer systems and networks from unauthorized access, theft, and damage, and is an increasingly important field in today's digital age.
Description : What are the differences between threat, vulnerability, and consequence in the context of cybersecurity?
Last Answer : Those are academic terms, or possibly professional cybersecurity lingo. I'm a software developer, but have only done a few projects in cybersecurity, and I don't follow the academic or industry terminology very ... Update, or a DDOS attack. Could be ignorant users who don't know what they're doing.
Description : Why is it important to educate the employees of an organization about cybersecurity?
Last Answer : In this fast-paced digital world, cybercriminals are making deliberate attempts to gain access to the sensitive information and login credentials by tricking the innocent employees to fall into their ... its employees. Well-trained and educated employees are the best defence against cyber attacks.
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : Coded entries which are used to gain access to a computer system are called: a) Passwords b) Coded Instructions c) Conceal Feed Entry d) None of These
Last Answer : a) Passwords
Description : Which among the following is correct about "Child Pornography": a) Pedophiles lure the children by distributing pornographic material. b) Pedophiles falsely represent their selves as of same age and win the confidence ... order to sell those over the internet. e) All of the Above f) None of These
Description : For a project manager to have an effective means of identifying and communicating the planned activities and their interrelationships, he must use a network technique. One of the network ... evaluation review technique c. Path evaluation review technique d. Project execution review technique
Last Answer : b. Program evaluation review technique
Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above
Last Answer : 4) All of the above