Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access
Last Answer : D. Physical access
Last Answer : Answer. Option D.
Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access
Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking
Last Answer : d. Remote networking
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access
Last Answer : (a) remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : In assessing the technical competence of an internal auditor, an external auditor most likely would obtain information about the a. Organizational level to which the internal auditor reports. b. Quality of ... on the internal auditor's duties. d. Entity's commitment to integrity and ethical values.
Last Answer : Quality of working paper documentation, reports, and recommendations
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Last Answer : a) To think like hackers and know how to defend such attacks
Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect
Last Answer : c.ping
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing
Last Answer : Mobile computing
Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization
Last Answer : Application virtualization
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : Is it possible to hack someone's phone account and cut off their access to their own phone?
Last Answer : It can be done to some extent, for a limited time, depending on how much access the hacker has to what devices and information, and on how long it takes the victim to notice and to ... themself, the company may end up believing them and unblocking the phone and blocking the stolen phone instead.
Description : ____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach
Last Answer : a) Ethical hacking
Description : _____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach .
Description : _____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach
Description : What type of system energy is related to the molecular structure of a system? A. Macroscopic form of energy B. Microscopic form of energy C. Internal energy D. External energy
Last Answer : Microscopic form of energy
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Management's attitude toward aggressive financial reporting and its emphasis on meeting projected profit goals most likely would significantly influence an entity's control environment when a. External ... d. The audit committee is active in overseeing the entity's financial reporting policies
Last Answer : Management is dominated by one individual who is also a shareholder
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555
Last Answer : a. 65535
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : The basic structure of cell membranes (a) Is a lipid bilayer that serves as a barrier to water soluble molecules (b) Differs ultra structurally for internal and external membranes ... dispersed within a protein bilayer (d) Is visualised as bilaminar structure with transmission electron microscopy
Last Answer : Ans:(a)
Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.
Last Answer : (A) Conceptual view.
Description : When a group of computers is connected together in a small area without the help of telephone lines, it is called : (1) Remote Communication Network (RCN) (2) Local Area Network (LAN) (3) Wide Area Network (WAN) (4) Value Added Network (VAN)
Last Answer : Local Area Network (LAN)
Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process
Last Answer : Ensure cloud networks and connections are secure
Description : Which type of commands in DOS needs additional files for their execution? 1) Internal Commands 2) External Commands 3) Batch Commands 4) Redirector
Last Answer : 2) External Commands
Description : Which type of commands in DOS needs additional files for their execution? 1 Internal Commands 2 External Commands 3 Batch Commands 4 Redirectors
Last Answer : 2 External Commands
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : http://www.hack-test.com
Last Answer : Here's how: http://blog.abhishekg.com/2012/01/level-9-where-is-the-password/?i=1
Description : Sandra, a new salesperson for Brenham Foods calls in an order for twice the amount of merchandise that Corner Market requested because she knows that it will increase her sales and will not ... in ethical decision making. A)opportunity B)exposure C)significant others D)peers E)external rewards
Last Answer : A)opportunity