Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner
Last Answer : d. Banner
Description : An email bomb is also known as a ___ a) Letter bomb b) Internet c) Banner d) Attack
Last Answer : a) Letter bomb
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Ethical Hacking is also known as _____ A. Black Hat Hacking. B. White Hat Hacking. C. Encryption. D. None of these.
Last Answer : B. White Hat Hacking.
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these
Last Answer : b) White hat hacking
Description : Ethical Hacking is known as ……….. a. White Hat hacking b. Black Hat hacking c. Encrypting d. None of these
Last Answer : a. White Hat hacking
Description : Exploration of a phone network without authorization is known as a. Scripting b. Phreaking c. Phone hacking d. Call tracing
Last Answer : b. Phreaking
Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening
Last Answer : c. Hacking
Description : The facility which enables to print a large number of letter/documents with more or less similar text. Under it same invitation letter has to be sent to invitees, Only the name and address are to be changed. It is called: a) E - Mail b) Spam Mail c) Mail Merge d) None of These
Last Answer : c) Mail Merge
Description : Sending an E-mail is similar to: a) Drawing a Picture b) Talking On the Phone c) Writing a Letter d) None of These
Last Answer : c) Writing a Letter
Description : Mark correct option relating to robbery a) When a robbery of the mail is committed on the high road, the postal official of whatever grade first receives information should be communicate to local police ... the investigation the final report should be sent to Head of the circle e) All the above
Last Answer : e) All the above
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning
Last Answer : D. Reconnaissance
Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning
Last Answer : e. Scanning
Description : When an official on duty in a mail van is attacked with any serious illness, the Mail Agent / Mail Guard should communicate the fact to a) The Guard of the train b) The Superintend c) The Record officer d) All the above
Last Answer : d) All the above
Description : Who has been delegated to power to grant rules 38 transfer of official belongings to Postmen/Mail guards? a) Senior Supdt. of Post office b) Super indent of Post office c) Postmaster General d) Head Post master of HO
Last Answer : c) Postmaster General
Description : Mark correct option related to official postal articles a) The rules relating to private correspondence apply equally to official postal article b) Service stamps can be used for prepayin outward official foreign ... means of service stamps c) All of above are correct d) None of these are correct
Last Answer : c) All of above are correct
Description : Mark incorrect option a) Complaint and enquiries relating to foreign mail the postage stamp equivalent to the fee prescribed is charged b) The sender of foreign article should be written RENVOI PAR AVION'( ... but this rule shall not apply to an official parcel. d) All the above are correct
Last Answer : d) All the above are correct
Description : Punishment for Hacking in Inida is: a) Imprisonment up to 3 years only b) Fine (Depend on case to case) only c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These
Last Answer : c) Bug
Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above
Last Answer : 4) All of the above
Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers
Last Answer : d) Whistle Blowers
Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism
Last Answer : c) Ethical hacking
Description : 5. Hacking for a cause is called __________________ A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking
Last Answer : B. Hacktivism
Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy
Last Answer : C. Hacking
Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Last Answer : d) Ethics in black hat hacking
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking
Last Answer : b) disclosure
Description : ____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach
Last Answer : a) Ethical hacking
Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms
Last Answer : c) Malware
Description : 4. Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking
Description : Which is not an Ethical Hacking related career a. Back-End Developer b. Software Tester c. Software Developer d. Computer Networking Specialist
Last Answer : b. Software Tester
Description : How many steps are there the legality of ethical hacking ? a. 5 b. 2 c. 7 d. 6
Last Answer : a. 5
Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data
Last Answer : a. Identifying weakness in computer system or networks
Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems
Last Answer : b. A procedure to find the Digital Evidence
Description : Ethical Issues in Digital Forensic means : a. Set of moral principals that regulate the use of computers b. Related to ethical hacking c. Honesty towards investigation d. Compliance with law
Last Answer : a. Set of moral principals that regulate the use of computers
Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these
Last Answer : b. Weakness
Last Answer : d. Protocols of corrupting data
Description : Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking
Description : . What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance