When a hacker attempts to attack a host via the Internet it is known as what type of attack?
 Local access
 Remote attack
 Internal attack
 Physical access

1 Answer

Answer :

 Remote attack

Related questions

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access

Last Answer : (a) remote attack

Description : What is the attack called “evil twin”?  Rogue access point  ARP poisoning  Session hijacking  MAC spoofing

Last Answer :  MAC spoofing

Description : what is the primary goal of an Ethical Hacker ?  Avoiding detection  Testing security controls  Resolving security vulnerabilities  Determining return on investment for security measures

Last Answer :  Resolving security vulnerabilities

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network

Last Answer : (d) physical network

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : Answer. Option D.

Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access

Last Answer : D. Physical access

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : What is the first phase of hacking?  Maintaining access  Gaining access  Reconnaissance  Scanning

Last Answer :  Scanning

Description : Which are the four regional Internet registries?  APNIC, MOSTNIC, ARIN, RIPE NCC  APNIC, PICNIC, NANIC, ARIN  APNIC, PICNIC, NANIC, RIPE NCC  APNIC, LACNIC, ARIN, RIPE NCC

Last Answer :  APNIC, LACNIC, ARIN, RIPE NCC

Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist

Last Answer : a. White hat hackers

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535

Description : Should a school district be able to monitor students via remote access to laptops?

Last Answer : No…Hell no.

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers

Last Answer : d. Internal attackers

Description : Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an a) ... b) Internet access provider c) Application service provider d) Outsource agency e) None of these

Last Answer : d) Outsource agency

Description : . Banner grabbing is an example of what?  Footprinting  Active operating system fingerprinting  Passive operating system fingerprinting  Application analysis

Last Answer :  Passive operating system fingerprinting

Description : . What port number does HTTPS use?  53  443  80  21

Last Answer :  443

Description : . . Hacking for a cause is called ..................  Hacktivism  Black-hat hacking  Active hacking  Activism

Last Answer :  Hacktivism

Description : What are the forms of password cracking techniques?  AttackSyllable  AttackBrute Forcing  AttacksHybrid  All of the above

Last Answer :  All of the above

Description : A Hybrid Bayesian network contains  Both discrete and continuous variables  Only Discontinuous variable  Both Discrete and Discontinuous variable  Continous variable only.

Last Answer :  Both Discrete and Discontinuous variable

Description : Which is not a property of representation of knowledge?  Inferential Adequacy  Representational Adequacy  Representational Verification  Inferential Efficiency

Last Answer :  Representational Adequacy

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect

Last Answer : c.ping

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : hacker attack on the phone ... what to do with such a phone? ... how to prevent it? ... premium sms, calls to foreign numbers without one's knowledge. Antivirus installed. How to solve such a problem.

Last Answer : ... "premium sms, calls to foreign numbers" ... As far as I know, the user must allow Premium SMS. And the "call to foreign numbers" do you mean ?? - the phone "dials" the number from itself ??? ... , applications, etc. will be deleted). If you do not know how to solve it - contact the service ...

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : I'd like to buy a small, portable device that I can use to access the internet via wireless. Would you recommend an ipod touch, Kindle touch, or something else?

Last Answer : Not sure what your price point is and what Apps you need to run but I have a Kindle Fire and it serves the purpose you describe and for $199 is a good solution. Of course you can go for the IPad if ... to do the IPad can run around $500 give or take $100 based on how much memory you want or need.

Description : How to Get Internet Access in Remote Areas with Satellite Internet Providers?

Last Answer : As technological innovations sweep across the globe, there are still areas of country that remain without top quality coverage from cable and internet companies. Residential and business customers in ... high speed satellite internet service to residential and business customers in rural areas. S

Description : When a group of computers is connected together in a small area without the help of telephone lines, it is called : (1) Remote Communication Network (RCN) (2) Local Area Network (LAN) (3) Wide Area Network (WAN) (4) Value Added Network (VAN)

Last Answer : Local Area Network (LAN)

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : The process of a computer receiving information from a server via Internet is known as:  (A) Uploading (B) Retrieving (C) Downloading (D) All of the above

Last Answer : The process of a computer receiving information from a server via Internet is known as: Downloading 

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical