Intruders is a most common security threat which referred as?
a)Account Access
b)Data Access
c)Hacker or Cracker
d)Computer Access

1 Answer

Answer :

c)Hacker or Cracker

Related questions

Description : What is the difference between hacker and cracker ?

Last Answer : The difference between hackers and crackers is that hackers attack your computer with malicious intent and without your knowledge. Crackers, on the other hand , enter your computer to grab your important information. With which you can be harmed.

Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : The term cracker refers to_____ A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.

Last Answer : A. Black hat hacker.

Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy

Last Answer : a)Security Policy

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies

Last Answer : c) Firewall

Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less

Last Answer : a) High

Description : If the threat of substitute products or services in low it is a/an ; a) Disadvantages of the supplier b) Advantages of the buyer c) Advantages of the supplier d) None of the above

Last Answer : c) Advantages of the supplier

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : The cultural and creative media products of a country are referred to as- (a) Virtual power (b) Economic power (c) Horse power (d) Soft powe

Last Answer : (d) Soft power

Description : Mass killing diseases can be referred as a. Biological disaster b. Industrial disaster c. War disaster d. Flood disaster

Last Answer : a. Biological disaster

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist

Last Answer : a. White hat hackers

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls

Last Answer : a. Avoiding Detection

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke

Last Answer : A. Security professional

Description : what is the primary goal of an Ethical Hacker ?  Avoiding detection  Testing security controls  Resolving security vulnerabilities  Determining return on investment for security measures

Last Answer :  Resolving security vulnerabilities

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Will our dogs always bark at imaginary intruders?

Last Answer : Get a collar that punishes them for barking.

Description : What might be an intruders typical response be to being wounded by shotgun blast by the home owner?

Last Answer : First response: Ouch! Holy Shit! Second response: run away if they can, duck if they can’t, raise arms and yell “don’t shoot”.

Description : Sarah McKinley shoots intruder, intruder's accomplice is the only one charged. Is this fair?

Last Answer : She should get a reward. Stewart should get the book thrown at him.

Description : People who shower naked, why aren't you worried about fire or intruders?

Last Answer : Y’all don’t shower naked in your own home???

Description : Are High speed connections ( cable and dsl ) are the only two connections intruders attack?

Last Answer : No

Description : Are High speed connections ( cable and dsl ) are the only two connections intruders attack?

Last Answer : No

Description : If the post office people had been termed as a ―bunch of crooks‖ by Lencho, what could be the other word that could replace ―Crooks‖? (a) Peasants (b) Hooligans (c) Pests (d) Intruders

Last Answer : (b) Hooligans

Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : c. Firewall

Description : Is there a way to keep your Facebook account hacker free?

Last Answer : Supposedly they are instituting better and simpler to implement privacy settings soon so that your information will not be as available to advertisers, etc.

Description : Can a hacker reactivate your Facebook account?

Last Answer : If “hackers” actually do anything more than serve as a scapegoat for media technophobia, I’d imagine that they certainly have better things to do with their time than reactivate old Facebook accounts.

Description : If your Facebook account has ever been hacked, why do you the hacker was successful?

Last Answer : There are many ways by which hackers get hold of our account and hack into it,so people just have to be very careful so as not to be victims.one way which is very rampant is through our ... is when we access our account through a non secured connection our login data might be stolen by hackers.