Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers
Last Answer : e) break into other people's computers
Description : Governments hired some highly skilled hackers. These types of hackers are termed as _______ a) Special Hackers b) Government Hackers c) Cyber Intelligence Agents d) Nation / State sponsored hackers
Last Answer : d) Nation / State sponsored hackers
Description : These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to? a) White hat Hackers b) Elite Hackers c) Licensed Penetration Testers d) Red Hat Hackers
Last Answer : b) Elite Hackers
Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers
Last Answer : c) Cyber Terrorists
Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers
Last Answer : d) Whistle Blowers
Description : ______ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers
Last Answer : a) Grey Hat hackers
Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers
Last Answer : d) Black Hat Hackers
Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker
Last Answer : b) White Hat Hackers
Description : Which federal law is most commonly used to prosecute hackers? A. Title 12 B. Title 18 C. Title 20 D. Title 2
Last Answer : B. Title 18
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Last Answer : a) To think like hackers and know how to defend such attacks
Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Last Answer : C)Combination of White and black hat hackers
Description : Hackers are also called as a. Good Guys b. Bad Guys c. Both of the above d. None of the above
Last Answer : b. Bad Guys
Description : Tools used by ethical hackers……….. a. Scanner b. Decoder c. Proxy d. All of these
Last Answer : a. Scanner
Last Answer : D. Script kiddies
Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol
Last Answer : c. ARP protocol
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : Which type of hackers are invited by the software vendors to find the security flaws in their system? a. White hat hackers b. Black hat hackers c. Grey hat hackers d. Blue hat hackers
Last Answer : d. Blue hat hackers
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : What is the one thing that old hackers were fond of or find interests in? a) Breaking Other’s system b) Voracious thirst for knowledge c) Cracking Phone calls d) Learning new languages
Last Answer : b) Voracious thirst for knowledge
Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access
Last Answer : (a) remote attack
Description : hackings for a causes is called (a) active hacking (b) hacktivism (c) activism (d) black-hat-hackers
Last Answer : (b) hacktivism
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers
Last Answer : (a) Security professional
Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Description : Computer Hackers have been in existence for more than a____. A. Decade. B. Year. c Century D. Era.
Last Answer : c Century
Description : Who described a dissertation on fundamentals of hacker’s attitude? A. G. Palma. B. Raymond. C. Either. D. Jhon Browman.
Last Answer : B. Raymond.
Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.
Last Answer : A. Maintaining Access.
Description : One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________ a) Sponsored hackers b) Crackers c) Hactivist d) Whistleblowers
Last Answer : d) Whistleblowers
Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms
Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity
Last Answer : c) Script Kiddies
Description : ________ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers
Description : Which federal law is most commonly used to prosecute hackers? ∙ A. Title 12 ∙ B. Title 18 ∙ C. Title 20 ∙ D. Title 2
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : According to United Nations Conference on Trade and Development (UNCTAD) report, what is the position of India in Asia among the largest recipients of Foreign Direct Investment (FDI)? A) 12th B) 10th C) 4th D) 9th E) 6th
Last Answer : C) 4th Explanation: Switzerland based United Nations Conference on Trade and Development (UNCTAD) released the World Investment Report stated that India is the fourth largest recipient of Foreign Direct ... involvement of India in Foreign Direct Investment is likely to reach USD 60 billion in 2016
Description : Participate can see and hear each other in a/an: a) Electronic Mail System b) Message System c) Tele - Conference d) Bulletin Board e) None of The Above
Last Answer : c) Tele - Conference
Description : Are corporations and goverment agencies helpless against hackers for ransom?
Last Answer : If they can get through the Anti-virus programs and the firewalls then yup.
Description : Can hackers use your webcam without making the indicator light turn on?
Last Answer : I don’t think that’s possible not 100% sure though.
Description : If the hackers of Yahoo have the the password how do people sign in?
Last Answer : If you remember the password ( I hope) and if hasn’t been updated by hackers ( hopefully) then you don’t need security question information to change your password. You’ll require it only when you have forgotten your password.
Description : What do hackers get when they hack a Facebook profile?
Last Answer : For one thing, many people use the same password for multiple websites.
Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?
Last Answer : This is not a question.