A person who used his/her expertise to gain access to other people's
computers to get information illegally or do damage is a ________:
a) Hacker
b) Analyst
c) Instant Messenger
d) Programmer
e) Spammer

1 Answer

Answer :

a) Hacker

Related questions

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : Personnel who design, program, operates and maintains computer equipment refers to A) Console-operator B) Programmer C) Peopleware D) System Analyst

Last Answer : Answer : C

Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : Peopleware

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : In NUUP, a customer can access banking services by just pressing ________ from his/her mobile phones. A. *999# B. #*99# C. *99# D. 1*99# E. None of the Above

Last Answer : C. *99# Explanation: In NUUP, a customer can access banking services by just pressing *99# from his/her mobile phones. This service works across all GSM mobile handsets.

Description : Crop logging’ is the method of? a. Soil fertility evaluation b. Plan analyst for assessing requirements for nutrients for crop production c. Assessing crop damage d. Testing suitability of fertilizers e. None of these

Last Answer : e. None of these

Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker

Last Answer : b) White Hat Hackers

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist

Last Answer : a. White hat hackers

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreake

Description : How did a spammer get a hold of my friend's email account and send spam from her email address?

Last Answer : She must have downloaded an infested file (with a spyware or adware attached) which used her address book to send spam. She should run a virus test. Most likely she is unaware of this. There ... called AdAware-a free version is available and might help rid her computer of many spy and adware.

Description : Help me defeat Instant Messenger glitches?

Last Answer : Have you tried Yahoo? I believe they have a good IM thingy…can’t recall if I’ve ever tried it myself though.

Description : What is a good cross-platform Instant messenger service?

Last Answer : I like Pidgin, myself. There are a couple of other freeware chat clients.

Description : What's the possibility of apple releasing an AOL instant messenger application for like iPhone like you see on the T-Mobile Sidekick?

Last Answer : answer:Have you tried meebo? I don’t know how it works with iPhone, but I use it all the time for online ims. www.meebo.com

Description : How can AOL afford to offer their AIM Instant Messenger service to non-AOL users for free?

Last Answer : answer:Who knows these days in the old days it was to permit the AOL users to chat with the non-AOL users without the AOL users having to learn to use ICQ (and therefore diminish their premium AOL ... (I can't remember), but most clients pop up some scary warning when you try to directly connect.

Description : What are the chances of a good instant messenger like the one on the sidekick will be released for the iPhone when the SDK comes out?

Last Answer : answer:If you're interesting in jailbreaking your iPhone (which is well worth it if you're using AT&T, firmware hacks with other providers are a pain in the a**) there are two really great chat apps. Apollo ... know some of the other webapps can be a bit janky, but this one is spot on in my opinion.

Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers

Last Answer : e) break into other people's computers

Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these

Last Answer : d) internet telephony

Description : When attempting to build a risk premium into the required returns of stocks in a developing country, an analyst should use the ________. a) country spread model b) country's weighted average cost of capital c) modified Gordon growth model d) dividend discount model

Last Answer : a) country spread model

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Which among the following is incorrect: a) Computer - Machine that will carry out the process described by program b) Person - Programmer who serves as the source of the communication c) Process - The ... - Actual System or environment where the problem arises e) None of These f) All of the above

Last Answer : e) None of These

Description : The person who writes and tests computer programs is called a a) programmer b) computer scientist c) software engineer d) project developer e) None of these

Last Answer : c) software engineer

Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... . d. The procedures performed do not enable the accountant to express any form of assurance.

Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information

Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... form. d. The procedures performed do not enable the accountant to express any form of assurance

Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information.

Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False

Last Answer : a) True

Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False

Last Answer : a) True

Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False

Last Answer : a) True

Description : ________ is a standard whereby mobile phones can gain access to specially tailored Internet websites. A. Bluetooth B. GPRS C. WAP D. EDGE

Last Answer : C. WAP

Description : ________ occurs if a microbial member of the normal microbiota should gain access to sterile tissue. a. Pathogenicity Islands b. Exogenous Infection c. Endogenous Infection d. Polymicrobial Disease

Last Answer : c. Endogenous Infection

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker