Description : What does an authorization profile in an AS ABAP based SAP system contains? A. collection of authorizations B. The user menu C. Profile parameters, such as the password ... (login/password_expiration_time) D. The collection of the authorizations checks that a user has passed successfully
Last Answer : A. collection of authorizations
Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing
Last Answer : A. Hacking
Description : What we called A person who pretends to know a great deal about medicine?
Last Answer : Charlatan
Description : a person who pretends to have certain beliefs, attitudes or feelings when they really do not -Do You Know?
Last Answer : The definition of a hypocrite is a person who pretends to have certain beliefs, attitudes or feelings when they really do not. An example of a hypocrite is a person who says they care about the environment, but are constantly littering.
Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above
Last Answer : b. Transaction Phase
Description : Have you seen the very funny Prince impersonation Diet Dr. Pepper commercial?
Last Answer : Well it looks like there’s a whole string of these little clips done by someone called “Lil’ Sweet.” I just caught the one about the playhouse. Pretty funny.
Description : A kind of impersonation in order to get access to other computers is__________ A. Hacking B. Spam C. Phishing D. Spoofing
Last Answer : D. Spoofing
Description : What special power does Clara have that Marco pretends to posses?
Last Answer : Jejd
Description : What special powers does Clara have that Marcos pretends to posses?
Last Answer : [object Object]
Description : Which statement is valid about computer program? A) It is understood by a computer B) It is understood by programmer C) It is understood user D) Both a & b
Last Answer : Answer : D
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer
Last Answer : a) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer
Last Answer : 1) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer
Last Answer : 1 Hacker
Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation
Last Answer : A) Encryption
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Description : Which list is used in the authorization process A)Access Control List
Last Answer : A)Access Control List
Description : Exploration of a phone network without authorization is known as a. Scripting b. Phreaking c. Phone hacking d. Call tracing
Last Answer : b. Phreaking
Description : According to the text, the most common mistake that prevents evidence seized from Being admitted is: a. Uninformed consen b. Forcible entry c. Obtained without authorization d. None of the above
Last Answer : c. Obtained without authorization
Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker
Last Answer : b) White Hat Hackers
Description : Which of the following terms best describes a living will? a) Medical directive The living will is a type of advance medical directive in which the individual of sound mind documents treatment preferences. b) ... to make health care decisions on his/her behalf when he/she is unable to do so.
Last Answer : a) Medical directive The living will is a type of advance medical directive in which the individual of sound mind documents treatment preferences.
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : Which post-installations activities are recommended by SAP after the installation of an SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. Restart your SAP system ... of users involved in the implementation project D. Confirm the installation in an SAP Support ticket
Last Answer : A. Restart your SAP system and check logs for errors B. Install a valid license key
Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers
Last Answer : d. Internal attackers
Description : What is the job of a black hat hacker ?
Last Answer : The job of a black hat hacker is to gain malicious intent by illegally entering a user's computer system or network.
Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls
Last Answer : a. Avoiding Detection
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker
Last Answer : A. Security professional
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreaker
Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Last Answer : C)Combination of White and black hat hackers
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : . What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed
Last Answer : c. Bachelor’s degree in the related field
Description : What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed
Last Answer : D. Internal attack
Last Answer : D. Script kiddies
Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : what is the primary goal of an Ethical Hacker ? Avoiding detection Testing security controls Resolving security vulnerabilities Determining return on investment for security measures
Last Answer : Resolving security vulnerabilities
Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555
Last Answer : a. 65535
Description : Complete the sentence below To catch a thief, think like a _______. a. Police b. Victim c. Thief d. Hacker
Last Answer : c. Thief
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack