Which among the following is correct about "Hacking":
a) Hacking is an illegal intrusion into a computer system and/or network.
b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is no
difference
between the term hacking and cracking).
c) Every act committed towards breaking into a computer and/or network is hacking.
d) Hacker can hack or personal monetary gains, such as to stealing the credit card
information,
transferring money from various bank accounts to their own account followed by
withdrawal of
money.
e) All of the Above
f) None of These

1 Answer

Answer :

e) All of the Above

Related questions

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : A. Hacking

Description : The rule debit all expenses and losses and credit all income and gains relates to A] Personal account B] Real account C] Nominal accounts D] All

Last Answer : C] Nominal accounts

Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : 8. The common name for the crime of stealing passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : Mark the correct option a) There is no maximum limit of deposit in TD accounts of any type b) No subsequent withdrawal allowed in TD accounts before date of maturity c) The investment under 5 years TD ... the benefit of Section 80C f the income tax Act 1961 from 01-04-2007 d) All the above

Last Answer : d) All the above

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above

Last Answer : a. electronic check

Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist

Last Answer : a. White hat hackers

Description : Mark the correct option a) Withdrawal will be allowed 50% deposited amount in RD account after one year and after 12 monthly deposit. b) No withdrawal is allowed in discontinued RD accounts c) 10% interest ... the 10th of the month, no interest shall be payable for that month e) All the above

Last Answer : e) All the above

Description : The process by which the central bank of a country controls the supply of money in the economy by exercising its control over interest rates in order to maintain price stability and achieve high economic ... A. Economic Policy B. Monetary Policy C. Fiscal Policy D. Credit Policy E. Budgetary Policy

Last Answer : B. Monetary Policy Explanation: Monetary Policy is the process by which monetary authority of a country, generally a central bank controls the supply of money in the economy by exercising its control over ... Bank of India (RBI). is so designed as to maintain the price stability in the economy.

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Mark the correct option a) The final withdrawal in saving account made through SB 7 only b) In joint B saving accounts at the ti c) Saving account of deceased depositor can not be transferred from one post office to another post office d) All the above

Last Answer : d) All the above

Description : In UPI, we can Send money to any bank account through mobile without entering ____________ A. debit/credit card details B. net banking/wallet password C. receiver‘s account number. D. All of the Above E. None of the Above.

Last Answer : D. All of the Above Explanation: Send money up to Rs 1 lakh to any bank account through the mobile without entering debit/credit card details, net banking/wallet password or even knowing the receiver‘s account number.

Description : 1. Thomas was caught stealing 27 times in one year, yet he was never arrested. How come?2. A truck driver went three blocks the wrong way down a one-way street with out breaking the law. How come?3. Not a single parent objected when the teacher spanked every child in the class. How come? -Riddles

Last Answer : 1. Thomas was a baseball player and was stealing bases. 2. The truck driver was walking. 3. The teacher was in an orphanage school.

Description : With my e-mail handle alone how can a hacker hack my password?

Last Answer : answer:By guessing. If you are using real words that are found in a dictionary then you are susceptible to a dictionary attack where a program try's to log on to your account using ... anonymous hacked the emails of a computer security company employed by the US government by doing exactly that.

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism

Last Answer : c) Ethical hacking

Description : Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________. a. Cracking b. Analysis c. Hacktivism d. Exploitation

Last Answer : d. Exploitation

Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism

Last Answer : c) Ethical hacking

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : Which, institution is known as the ‘Soft Loan Window’ of World Bank ? (A) I.F.C. (International Financial Corporation) (B) I.D.A. (International Development Association) (C) I.M.F. (International Monetary Fund) (D) Indian Development Forum

Last Answer : Answer: I.D.A. (International Development Association)

Description : Crime through Internet includes: a) Telemarketing b) Internet fraud c) Identity Theft d) Credit Card account thefts e) All of the Above f) None of These

Last Answer : e) All of the Above

Description : What harm could a hacker do if they hack your Google glasses?

Last Answer : Oh gawd… they could force me to watch My Little Pony reruns! A fate worse than death.

Description : Should you be able to hack back at the hacker?

Last Answer : self defence usually only works if you can show that all other options, like retreat, have already been exhausted. which in this case is having an impenetrable defence. And besides, I do not ... on the road? They are not an important reason enough to endanger traffic by braking or swiveling.)

Description : How does a Hacker hack?

Last Answer : I do not know and wouldn’t presume to tell you if I did. But I think the first step has something to do with selling your soul to the debil.

Description : Should a person who committed an illegal sexual act as a kid still be punished and not play in the NFL?

Last Answer : answer:All Time Felon Team. He should be allowed to play.