Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access
Last Answer : D. Physical access
Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network
Last Answer : (d) physical network
Last Answer : Answer. Option D.
Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access
Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking
Last Answer : d. Remote networking
Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol
Last Answer : c. ARP protocol
Description : Should a school district be able to monitor students via remote access to laptops?
Last Answer : No…Hell no.
Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP
Last Answer : c.Telnet
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.
Last Answer : A. Maintaining Access.
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an a) ... b) Internet access provider c) Application service provider d) Outsource agency e) None of these
Last Answer : d) Outsource agency
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect
Last Answer : c.ping
Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned
Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications
Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing
Last Answer : Mobile computing
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : I'd like to buy a small, portable device that I can use to access the internet via wireless. Would you recommend an ipod touch, Kindle touch, or something else?
Last Answer : Not sure what your price point is and what Apps you need to run but I have a Kindle Fire and it serves the purpose you describe and for $199 is a good solution. Of course you can go for the IPad if ... to do the IPad can run around $500 give or take $100 based on how much memory you want or need.
Description : How to Get Internet Access in Remote Areas with Satellite Internet Providers?
Last Answer : As technological innovations sweep across the globe, there are still areas of country that remain without top quality coverage from cable and internet companies. Residential and business customers in ... high speed satellite internet service to residential and business customers in rural areas. S
Description : When a group of computers is connected together in a small area without the help of telephone lines, it is called : (1) Remote Communication Network (RCN) (2) Local Area Network (LAN) (3) Wide Area Network (WAN) (4) Value Added Network (VAN)
Last Answer : Local Area Network (LAN)
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application
Last Answer : b. Host to host
Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : c. i, ii, iii, iv
Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above
Last Answer : C) Subnet number and host number.
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Last Answer : D. Script kiddies
Description : Which type of hackers are invited by the software vendors to find the security flaws in their system? a. White hat hackers b. Black hat hackers c. Grey hat hackers d. Blue hat hackers
Last Answer : d. Blue hat hackers
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning
Last Answer : D. Reconnaissance
Description : . What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance
Description : What is the attack called “evil twin”? Rogue access point ARP poisoning Session hijacking MAC spoofing
Last Answer : MAC spoofing
Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack
Last Answer : d. SQL Injection attack
Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning
Last Answer : e. Scanning
Description : what is the first phase of hacking (a) attack (b) maintaining access (c) gaining access (d) reconnaissance
Last Answer : (d) reconnaissance