Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker
Last Answer : A. Security professional
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : What can a hacker/malicious person do with just an IP address?
Last Answer : For some reason I think I heard this somewhere before I think they can be used and sold to set up a system failure on a different website with high security. If a mass quantity of IP ... website would crash. This would make it easier for someone to obtain information from a high security site.
Description : An attackers can create an …....attack by sending hundreds or thousand of e-mail with very large attachment. a. Connection Attack b. Auto responder Attack c. Attachment overloading Attack d. All of the above
Last Answer : c. Attachment overloading Attack
Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack
Last Answer : d. SQL Injection attack
Description : Malicious Software is also known as: a) Statware b) Malware c) Dareware d) None of These
Last Answer : b) Malware
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : Which of the following statements is not a distinction between independent auditing and internal auditing? a. Independent auditors represent third party users external to the auditee entity, ... validity and relevance of evidence, internal auditors are concerned almost exclusively with validity.
Last Answer : Although independent auditors strive for both validity and relevance of evidence, internal auditors are concerned almost exclusively with validity.
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : Should the news media start showing photographs of the attackers rather than the victims?
Last Answer : No. As a matter of fact, news stations are getting away from showing the attacker or using their name as it just gives them the glory they are seeking. Very seldom does it shame them.
Description : How many of the original planners/attackers for 9/11 are still at large?
Last Answer : That depends on who you consider responsible.
Description : Women: Could you squish an attacker's eye with your thumb if you needed to?
Last Answer : Yes i can, it is amazing what one can do with pure addellion, no matter the other persons size and streingth.
Description : What are the primary interest of online attackers in spyware? -Technology
Last Answer : Primary interest of online attackers in spyware is using it to steal personal information for financial crimes such as carding and identity theft or to sell that information to someone else who then executes more traditional financial crimes.
Description : Who are hostile attackers in football?
Last Answer : Need answer
Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These
Last Answer : a) Malicious
Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers
Last Answer : (a) Security professional
Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms
Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity
Description : What is clickjacking ? (1) Malicious technique of tricking Web usear into revealing confidential information (2) A device that sends and receives data in a bit second (3) A form of Computer Engineering (4) A digital process that is used to display an image on monitor
Last Answer : Malicious technique of tricking Web usear into revealing confidential information
Description : A _____ is a computer, appliance, or router that sits between the trusted and untrusted systems. (1) bridge (2) switch (3) firewall (4) hub
Last Answer : firewall
Description : Are some companies in Russia also getting attacked by hacker-blackmailers for money?
Last Answer : Blackmailers or ransom? Either way, I would assume so, but I’m finding it less than trivial to search for, because of all the articles about cyber ransom attacks from Russia.
Description : Do you still have to remember usernames with "SuperGenPass"? what about password lenght requirements that are diff on diff sites, also: any alternatives you guys use that's 100% hacker safe?
Last Answer : answer:i just use the same…i don’t care that people see me on empornium etc. but ofcourse, everything will never be fully hackproof…
Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user
Last Answer : A. Impersonation
Description : Management's attitude toward aggressive financial reporting and its emphasis on meeting projected profit goals most likely would significantly influence an entity's control environment when a. External ... d. The audit committee is active in overseeing the entity's financial reporting policies
Last Answer : Management is dominated by one individual who is also a shareholder
Description : Which of the following statements is not correct? A. For the purpose of Funds Flow Statement, the term 'fund ' generally refers to net working capital B. Funds flow is a wider concept than ... business D. The capitalisation of reserves by the issue of bonus shares also involves flow of funds
Last Answer : D. The capitalisation of reserves by the issue of bonus shares also involves flow of funds
Description : Vertical analysis is also known as ------------------ a) Dynamic analysis b) Static analysis c) External nalysis d) Internal analysis
Last Answer : b) Static analysis
Description : What is the job of a black hat hacker ?
Last Answer : The job of a black hat hacker is to gain malicious intent by illegally entering a user's computer system or network.
Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer
Last Answer : a) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer
Last Answer : 1) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer
Last Answer : 1 Hacker
Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker
Last Answer : b) White Hat Hackers
Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls
Last Answer : a. Avoiding Detection
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreaker
Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Last Answer : C)Combination of White and black hat hackers