Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies
Last Answer : (a) white hat hacking
Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies
Last Answer : A. White Hat Hacking
Description : An email bomb is also known as a ___ a) Letter bomb b) Internet c) Banner d) Attack
Last Answer : a) Letter bomb
Description : SNMP port is a) 37 b) 53 c) 111 d) 161
Last Answer : d) 161
Description : ___for ping sweeps and port scanning a) Sam Spade b) SuperScan c) NetScan d) NetCat
Last Answer : b) SuperScan
Description : Cross Site Scripting is also shortly khown as a) XSS b) HTTP c) HTTPS d) DNS
Last Answer : a) XSS
Description : An attacker can create an _____attack by sending hundreds or thousands of email with very large attachments a) Connection Attacks b) Auto responder attacks c) Attachment Overloading Attacks d) All of the above
Last Answer : c) Attachment Overloading Attacks
Description : What port number does HTTP use a) 53 b) 69 c) 80 d) 79
Last Answer : c) 80
Description : What port number does DNS use a) 37 b) 53 c) 69 d) 79
Last Answer : b) 53
Description : SNMP stands for a) Simple Networks Messaging Protocol b) Simple Networks Mailing Protocol c) Simple Networks Management Protocol d) Simple Networks Master Protocol
Last Answer : c) Simple Networks Management Protocol
Description : Which of the following tools is used for Networks Testing and port Scanning a) NetCat b) SuperScan c) NetScan d) All of Above
Last Answer : d) All of Above
Description : What is Banner Grabbing ? a. Act of capturing the information by banners b. Grabbing Information c. Information Sharing d. Sharing Information
Last Answer : a. Act of capturing the information by banners
Description : . Banner grabbing is an example of what? Footprinting Active operating system fingerprinting Passive operating system fingerprinting Application analysis
Last Answer : Passive operating system fingerprinting
Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack
Last Answer : d. XSS attack
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Last Answer : D. Script kiddies
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these
Last Answer : b) White hat hacking
Description : Ethical Hacking is known as ……….. a. White Hat hacking b. Black Hat hacking c. Encrypting d. None of these
Last Answer : a. White Hat hacking
Description : Ethical Hacking is also known as _____ A. Black Hat Hacking. B. White Hat Hacking. C. Encryption. D. None of these.
Last Answer : B. White Hat Hacking.
Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers
Last Answer : d) Black Hat Hackers
Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers
Last Answer : d) Whistle Blowers
Last Answer : c) Script Kiddies
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : 5. Hacking for a cause is called __________________ A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking
Last Answer : B. Hacktivism
Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Last Answer : d) Ethics in black hat hacking
Description : 4. Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking
Description : Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking
Description : . . Hacking for a cause is called .................. Hacktivism Black-hat hacking Active hacking Activism
Last Answer : Hacktivism
Description : hackings for a causes is called (a) active hacking (b) hacktivism (c) activism (d) black-hat-hackers
Last Answer : (b) hacktivism
Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Description : Hacking for a cause is called __________________. ∙ A. Active hacking ∙ B. Hacktivism ∙ C. Activism ∙ D. Black-hat hacking
Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner
Last Answer : d. Banner
Description : What is considered as a perfect absorber as well as a perfect emitter? A. Gray body B. Black body C. Real body D. White body
Last Answer : Black body
Description : V- model uses -------- test models a) Component testing, integration testing, system testing and acceptance testing b) alpha testing, beta testing , acceptance testing and user testing c) black box testing, white box testing and gray box testing
Last Answer : a
Description : Do you agree with this council member and his lawyer that the act of grabbing this woman was just a "joke," and people are make a big to-do about nothing?
Last Answer : it's assault, plain and simple. People who call it ridiculous political correctness have no concept of the level of discomfort (read: a certain amount of pain) that these actions cause. Bruising and ... that do this kind of thing would never dream of doing the same thing to dogs or children.
Description : Why is it that men openly adjusting/grabbing themselves in public is socially acceptable?
Last Answer : Got me swinging. That’s why I don’t watch it. Men, anyway. I have no problem with a woman adjusting herself.
Description : If you are beset by hordes of chiggers, and are itching like mad, would grabbing a live spark plug wire on a lawn mower kill the suckers?
Last Answer : WTF is a chigger?
Description : With pointed fangs I sit and wait; with piercing force I crunch out fate; grabbing victims, proclaiming might; physically joining with a single bite. What am I? -Riddles
Last Answer : I am a Stapler.