Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : Which hacker refers to ethical hacker? A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.
Last Answer : B. White hat hacker.
Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker
Last Answer : b) White Hat Hackers
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker
Last Answer : A. Security professional
Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Last Answer : C)Combination of White and black hat hackers
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke
Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above
Last Answer : d) All of the above
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Last Answer : D. Script kiddies
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreaker
Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreake
Description : Cracker is known as a) Black hat b) White hat c) Encrypting d) None of these
Last Answer : a) Black hat
Description : ______ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers
Last Answer : a) Grey Hat hackers
Description : Which type of hackers are invited by the software vendors to find the security flaws in their system? a. White hat hackers b. Black hat hackers c. Grey hat hackers d. Blue hat hackers
Last Answer : d. Blue hat hackers
Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers
Last Answer : (a) Security professional
Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies
Last Answer : A. White Hat Hacking
Description : ________ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers
Description : What is the job of a black hat hacker ?
Last Answer : The job of a black hat hacker is to gain malicious intent by illegally entering a user's computer system or network.
Description : What is the difference between hacker and cracker ?
Last Answer : The difference between hackers and crackers is that hackers attack your computer with malicious intent and without your knowledge. Crackers, on the other hand , enter your computer to grab your important information. With which you can be harmed.
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : What is the term for Optimization strategies that are in an unknown area of reputability? A. Blue hat techniques B. Orange hat techniques C. Grey hat techniques D. Shady hat techniques
Last Answer : C. Grey hat techniques
Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing
Last Answer : C. White-box testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing
Last Answer : c. White-box testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing
Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers
Last Answer : d) Black Hat Hackers
Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Description : Ethical Hacking is known as ……….. a. White Hat hacking b. Black Hat hacking c. Encrypting d. None of these
Last Answer : a. White Hat hacking
Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies
Last Answer : (a) white hat hacking
Description : Ethical Hacking is also known as _____ A. Black Hat Hacking. B. White Hat Hacking. C. Encryption. D. None of these.
Last Answer : B. White Hat Hacking.
Description : Which of the following is the correct depiction of optimization strategy? a. Orange Hat Techniques b. Grey Hat Techniques c. Shady Hat Techniques d. Blue Hat Technique
Last Answer : b. Grey Hat Techniques
Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : From where the term ‘hacker’ first came to existence? a) MIT b) Stanford University c) California d) Bell’s Lab
Last Answer : a) MIT
Description : Development journalism is related to_____ (a) Investigative stories (b) Sports stories (c) Societal priorities (d) Crime stories
Last Answer : (c) Societal priorities
Description : Grippers are used to_____. (A) Hold the objects (B) Sense the objects (C) Move the objects (D) Both (A) & (C)
Last Answer : D
Description : When liquidation expenses is paid and borne by seller company then it is debited to_____ (A) Bank A/c (B) Goodwill A/c (C) Realisation A/c (D) Capital Reserve A/c.
Last Answer : (C) Realisation A/c
Description : The principle ―Debit the receiver and credit the giver‖ is related to_____ a) Personal a/c b) Real a/c c) Nominal a/c d) None
Last Answer : a) Personal a/c