Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access
Last Answer : D. Physical access
Last Answer : Answer. Option D.
Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access
Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network
Last Answer : (d) physical network
Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking
Last Answer : d. Remote networking
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access
Last Answer : (a) remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system
Last Answer : Run on single operating system
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud
Last Answer : hybrid cloud
Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud
Last Answer : Virtual Private Cloud
Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned
Last Answer : SOA provides access to reusable Web services over an SMTP network
Description : Point out the wrong statement. a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access to reusable Web services ... widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned
Description : In assessing the technical competence of an internal auditor, an external auditor most likely would obtain information about the a. Organizational level to which the internal auditor reports. b. Quality of ... on the internal auditor's duties. d. Entity's commitment to integrity and ethical values.
Last Answer : Quality of working paper documentation, reports, and recommendations
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Last Answer : a) To think like hackers and know how to defend such attacks
Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Description : The authors believe there are three tests that can be applied to judge whether a strategy is 'good'. These are: A. Fit, distinctiveness, sustainability B. Fit, internal ... , external environment C. Distinctiveness, internal resources, fit D. Sustainability, distinctiveness, external environment
Last Answer : Fit, internal resources, external environment
Description : For expanding access to banking services, the RBI has advised banks to open branches with minimum infrastructure support of 8 to 10BC units at a reasonable 3-4km. Such branches are known as _______ A. White Label ATMs B. Ultra Small Branches C. Banking Kiosks D. CBS Terminals E. ICT Hubs
Last Answer : B. Ultra Small Branches Explanation: Ultra Small Branches may be set up between the base branch and BC locations so as to provide support to about 8-10 BC Units at a reasonable distance ... for operating large customer transaction and would have to be managed full time by bank officers/ employees.
Description : WIMAX stands for (1) Wireless Interoperability for Microwave Access (2) Wired Interoperability for Microwave Access (3) Worldwide Interoperability for Microwave Access (4) Worldwide Infrastructure for Microwave Access
Last Answer : Worldwide Interoperability for Microwave Access
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing
Last Answer : Mobile computing
Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization
Last Answer : Application virtualization
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : What is the full form of NIV Foundation? a. Network Infrastructure Violation b. Network Issue Vulnerabilities c. Network Infrastructure Vulnerabilities d. Network Information Vulnerabilities
Last Answer : c. Network Infrastructure Vulnerabilities
Description : Which of the following are the foundation of all the technical security issues in your information systems? a. Network Infrastructure vulnerabilities b. Information vulnerabilities c. System Infrastructure vulnerabilities d. Network Information vulnerabilities
Last Answer : a. Network Infrastructure vulnerabilities
Description : Is it possible to hack someone's phone account and cut off their access to their own phone?
Last Answer : It can be done to some extent, for a limited time, depending on how much access the hacker has to what devices and information, and on how long it takes the victim to notice and to ... themself, the company may end up believing them and unblocking the phone and blocking the stolen phone instead.
Description : ____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach
Last Answer : a) Ethical hacking
Description : _____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach .
Description : _____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Management's attitude toward aggressive financial reporting and its emphasis on meeting projected profit goals most likely would significantly influence an entity's control environment when a. External ... d. The audit committee is active in overseeing the entity's financial reporting policies
Last Answer : Management is dominated by one individual who is also a shareholder
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555
Last Answer : a. 65535
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.
Last Answer : (A) Conceptual view.
Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect
Last Answer : c.ping