The programmers who break into secure systems for malicious purpose are -Technology

1 Answer

Answer :

(a) Crackers are the programmers that break into secure systems for malicious purpose.

Related questions

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : The primary purpose of an operating system is.... 1) To make the most efficient use of the computer hardware 2) To allow people to use the computer 3) To keep systems programmers employed 4) To make computers easier to use

Last Answer : 1) To make the most efficient use of the computer hardware

Description : The primary purpose of an operating system is.... 1 To make the most efficient use of the computer hardware 2 To allow people to use the computer 3 To keep systems programmers employed 4 To make computers easier to use

Last Answer : 1 To make the most efficient use of the computer hardware

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology

Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : Programmers use a variety of ………….. to communicate instructions to the computer. -Technology

Last Answer : Programmers use a variety of programming languagesto communicate instructions to the computer.

Description : ……….. allows customers to conduct financial transactions on a secure Website. -Technology

Last Answer : E-banking allows customers to conduct financial transactions on a secure Website.

Description : Which guided media provide secure transmission amongst all of them? -Technology

Last Answer : Optical fibre provides secure transmission as compared to twisted pair and co-axial cable. As, it is more immune to tapping than copper cables.

Description : Which guided media provide secure transmission amongst all of them? -Technology

Last Answer : Optical fibre provides secure transmission as compared to twisted pair and co-axial cable. As, it is more immune to tapping than copper cables.

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : What can the President do if a State fails to comply with the Directives of the Central Government? (1) He can dissolve State Legislature and order fresh elections (2) He can declare the break-down ... (3) He can send paramilitary forces to the State to secure compliance (4) Any of the above

Last Answer : (2) He can declare the break-down aconstitutional machinery in the State and assume responsibility for the governance of the State Explanation: If the President is satisfied, on the basis of the ... six months to a maximum period of three years with repeated parliamentary approval every six months.

Description : Saprophytic fungi A- engulf their food in order to break it down B- secure their food from dead organic materials C- both (a) and (b) D- none of the above

Last Answer : secure their food from dead organic materials

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : What is clickjacking ? (1) Malicious technique of tricking Web usear into revealing confidential information (2) A device that sends and receives data in a bit second (3) A form of Computer Engineering (4) A digital process that is used to display an image on monitor

Last Answer : Malicious technique of tricking Web usear into revealing confidential information

Description : …….. and ……… tags break the line flow. -Technology

Last Answer : and tags break the line flow.

Description : …………. splits text in columns at a specific point. (a) Column break (b) Page break (c) Next page (d) Continuous -Technology

Last Answer : (a) Column bj;eak splits text in columns at a specific pointing.

Description : A term that is used in spreadsheet which forces a line break in a cell when the cell entry is too large to fit in the cell. -Technology

Last Answer : (a) A term that is used in spreadsheet which forces a line break in a cell when the cell entry is too large to fit in the cellWrap.

Description : The purpose of a satellite station' in triangulation can be served by : (a) A Church spire' in order to secure a well- shaped triangle (b) A Flag pole' in order to secure a well- ... a well- shaped triangle (d) An Eccentric station' near the true station whereon the instrument cannot be setup

Last Answer : (d) An ‘Eccentric station’ near the true station whereon the instrument cannot be setup

Description : I am getting into the programming world, why is linux so important for programmers?

Last Answer : From what I understand most servers are run on a linux based system due to ease of use.

Description : Are raccoons intelligent enough to be malicious?

Last Answer : I don’t think so. They can be quite vicious if cornered, they are good survivalists.

Description : How to stop Malicious location application?

Last Answer : Have her just take her phone to her phone carrier and have them find the program. Another possible way is reset her phone to factory setting. But make ... Google does the same thing I believe. http://www.newmediarights.org/how_toconsumercreator/how_identify_and_remove_cell_phone_tracking_software

Description : Where is the slimy little bugger (malicious program) hiding?

Last Answer : Did you make sure Malwarebytes was up to date? I’m kinda shocked it got past Malwarebytes, but it can happen if the program isn’t kept right up to date. Make sure all your protection is right up to date and scan again,I have been told some malware like to partly hide in windows office.

Description : How do you deal with malicious people?

Last Answer : Just let it go and move on. Focus on the things that matter. You're going to encounter plenty of people like that but who they are is on them, it's not about you unless you let it be. You ... yourself and do your thing, which considering you're in a happy place seems to be working out pretty well.

Description : What can I do about a malicious Neighbor?

Last Answer : answer:Unless he's violating building codes, there's nothing that the law can do about what he builds on his property, or doesn't build. Likewise with trees. Is the tree exactly on your property line ... next door to him 15 years ago, what exactly started the pissing contest between the two of you?

Description : What can a hacker/malicious person do with just an IP address?

Last Answer : For some reason I think I heard this somewhere before I think they can be used and sold to set up a system failure on a different website with high security. If a mass quantity of IP ... website would crash. This would make it easier for someone to obtain information from a high security site.

Description : How do I stop Windows Update from continuously updating/downloading Windows Malicious Software Removal Tool?

Last Answer : Go to control panel, click on security, click on automatic updates, change the setting to notify me first.

Description : Why do malware writers create malicious programs?

Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.

Description : Can .mp3 files contain anything malicious?

Last Answer : Yes. I’ve spent a lot of time at work deleting mp3 files from our servers that contained downloaded music from Limewire that were infected with viruses and malware.

Description : What file extension is most likely to contain a malicious code?

Last Answer : .bat

Description : What made it a crime to write or publish false scandalous and malicious criticisms of the government?

Last Answer : No

Description : What is an example of malicious code?

Last Answer : Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above

Last Answer : Spread spectrum

Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These

Last Answer : a) Malicious

Description : Malicious Software is also known as: a) Statware b) Malware c) Dareware d) None of These

Last Answer : b) Malware

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers

Last Answer : d. Internal attackers

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke

Last Answer : A. Security professional

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers

Last Answer : (a) Security professional