Description : What is the difference between hacker and cracker ?
Last Answer : The difference between hackers and crackers is that hackers attack your computer with malicious intent and without your knowledge. Crackers, on the other hand , enter your computer to grab your important information. With which you can be harmed.
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : The term cracker refers to_____ A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.
Last Answer : A. Black hat hacker.
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy
Last Answer : a)Security Policy
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology
Last Answer : True Cracker breaks security with mal intentions.
Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above
Last Answer : d) All of the above
Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies
Last Answer : c) Firewall
Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less
Last Answer : a) High
Description : If the threat of substitute products or services in low it is a/an ; a) Disadvantages of the supplier b) Advantages of the buyer c) Advantages of the supplier d) None of the above
Last Answer : c) Advantages of the supplier
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : The cultural and creative media products of a country are referred to as- (a) Virtual power (b) Economic power (c) Horse power (d) Soft powe
Last Answer : (d) Soft power
Description : Mass killing diseases can be referred as a. Biological disaster b. Industrial disaster c. War disaster d. Flood disaster
Last Answer : a. Biological disaster
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v
Last Answer : c) i, ii, iii and v only
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer
Last Answer : hacker
Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer
Last Answer : a) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer
Last Answer : 1) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer
Last Answer : 1 Hacker
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls
Last Answer : a. Avoiding Detection
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker
Last Answer : A. Security professional
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke
Description : what is the primary goal of an Ethical Hacker ? Avoiding detection Testing security controls Resolving security vulnerabilities Determining return on investment for security measures
Last Answer : Resolving security vulnerabilities
Description : Will our dogs always bark at imaginary intruders?
Last Answer : Get a collar that punishes them for barking.
Description : What might be an intruders typical response be to being wounded by shotgun blast by the home owner?
Last Answer : First response: Ouch! Holy Shit! Second response: run away if they can, duck if they can’t, raise arms and yell “don’t shoot”.
Description : Sarah McKinley shoots intruder, intruder's accomplice is the only one charged. Is this fair?
Last Answer : She should get a reward. Stewart should get the book thrown at him.
Description : People who shower naked, why aren't you worried about fire or intruders?
Last Answer : Y’all don’t shower naked in your own home???
Description : Are High speed connections ( cable and dsl ) are the only two connections intruders attack?
Last Answer : No
Description : If the post office people had been termed as a ―bunch of crooks‖ by Lencho, what could be the other word that could replace ―Crooks‖? (a) Peasants (b) Hooligans (c) Pests (d) Intruders
Last Answer : (b) Hooligans
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : Is there a way to keep your Facebook account hacker free?
Last Answer : Supposedly they are instituting better and simpler to implement privacy settings soon so that your information will not be as available to advertisers, etc.
Description : Can a hacker reactivate your Facebook account?
Last Answer : If “hackers” actually do anything more than serve as a scapegoat for media technophobia, I’d imagine that they certainly have better things to do with their time than reactivate old Facebook accounts.
Description : If your Facebook account has ever been hacked, why do you the hacker was successful?
Last Answer : There are many ways by which hackers get hold of our account and hack into it,so people just have to be very careful so as not to be victims.one way which is very rampant is through our ... is when we access our account through a non secured connection our login data might be stolen by hackers.