Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________. a. Cracking b. Analysis c. Hacktivism d. Exploitation
Last Answer : d. Exploitation
Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism
Last Answer : c) Ethical hacking
Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls
Last Answer : a. Avoiding Detection
Description : what is the primary goal of an Ethical Hacker ? Avoiding detection Testing security controls Resolving security vulnerabilities Determining return on investment for security measures
Last Answer : Resolving security vulnerabilities
Description : ____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach
Last Answer : a) Ethical hacking
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : . Performing a shoulder surfing in order to check other’s password is ____________ ethical practice. a) a good b) not so good c) very good social engineering practice d) a bad
Last Answer : d) a bad
Description : Performing a shoulder surfing in order to check other’s password is ____________ ethical practice. a) a good b) not so good c) very good social engineering practice d) a bad
Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill
Last Answer : a. Art
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False
Last Answer : a) True
Description : At the beginning of the current audit engagement, the auditor should perform key preplanning activities which include all of the following except: a. Performing procedures regarding client acceptance ... c. Establishing an understanding of the terms of the engagement. d. Considering internal contro
Last Answer : Considering internal contro
Description : This fundamental principle requires a CPA not to use or disclose information acquired during the course of performing professional services without proper and specific authority. a. Objectivity. b. Professional Behavior. c. Professional Competence and Due care. d. Confidentiality
Last Answer : Confidentiality
Description : Product -related ethical issues can arise when marketers A)do not provide consumers with enough information about how a product is priced. B)force intermediaries to behave in a specific manner. C) ... with using a product. E)manufacture a product that is very similar to a competing product.
Last Answer : D)fail to disclose information to consumers about the risks associated with using a produc
Description : In which of the following circumstances would a CPA be bound by ethics to refrain from disclosing any confidential information obtained during the course of a professional engagement? a. The CPA is ... the PICPA. d. An inquiry by a disciplinary body of PICPA requests confidential client information
Last Answer : A major stockholder of a client company seeks accounting information from the CPA after management declined to disclose the requested information
Description : Which of the following procedures would an auditor be most likely to perform in planning a financial statement audit? a. Reviewing investment transactions of the audit period to determine ... the minutes of stockholder and director meetings to discover whether any unusual transactions have occurred.
Last Answer : Performing analytical procedures to identify areas that may represent specific risks.
Description : A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures. a) privacy and security b) rules and regulations c) hacking techniques d) ethics to talk to seniors
Last Answer : a) privacy and security
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening
Last Answer : c. Hacking
Description : A professional accountant has a professional duty or right disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose to ... body d. To respond to an inquiry or investigation by a member body or regulatory body
Last Answer : To disclose to the Bureau of Internal Revenue any fraudulent scheme committed by the client on payment of income tax
Description : A professional accountant has a professional duty or right to disclose confidential information in each of the following, except: a. To disclose to BIR fraudulent scheme committed by the client on payment ... body d. To respond to an inquiry or investigation by a member body or regulatory body
Last Answer : To disclose to BIR fraudulent scheme committed by the client on payment of income tax
Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy
Last Answer : Request by client's largest stockholder.
Description : A professional accountant has a professional duty or right to disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose ... body d. To respond to an inquiry or investigation by a member body or regulatory body
Last Answer : To disclose to BIR fraudulent scheme committed by the client on payment of income tax.
Description : Without the consent of the client, a CPA should not disclose confidential information contained in working papers to a: a. Voluntary quality control review board. b. CPA firm that has purchased the ... . c. National court that has issued a valid subpoena. d. Disciplinary body created under statute.
Last Answer : CPA firm that has purchased the CPA’s accounting practice.
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreaker
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : . What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed
Last Answer : c. Bachelor’s degree in the related field
Description : What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed
Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555
Last Answer : a. 65535
Description : Which hacker refers to ethical hacker? A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.
Last Answer : B. White hat hacker.
Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreake
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : 7. Before performing any penetration test, through legal procedure, which key points listed below is not mandatory? a) Know the nature of the organization b) Characteristics of work done in the firm c) System and network d) Type of broadband company used by the firm
Last Answer : d) Type of broadband company used by the firm
Description : Before performing any penetration test, through legal procedure, which key points listed below is not mandatory? a) Know the nature of the organization b) Characteristics of work done in the firm c) System and network d) Type of broadband company used by the firm