Description : Most computer crimes are committed by a) Hackers b) Inteenational spies c) Highly paid computer consultants d) Web designers
Last Answer : a) hackers
Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above
Last Answer : d) All of the above
Description : Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these
Last Answer : b) Weakness
Description : Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these
Last Answer : b) White hat hacking
Description : What is the attack called “evil twin” a) Rogue access point b) ARP poisoning c) Session hijacking d) MAC spoofing
Last Answer : a) Rogue access point
Description : What port number does HTTPS use a) 53 b) 443 c) 80 d) 21
Last Answer : Basics-of-Hacking
Description : It is powered by ______ encryption tools a) WEP WPA & WPA2 b) WEP c) WPA d) None of these
Last Answer : a) WEP WPA & WPA2
Description : _____is used to detect wireless networks on the windows platform a) Medusa b) NetStumbler c) SQLMap d) Iraon WASP
Last Answer : b) NetStumbler
Description : Cracker is known as a) Black hat b) White hat c) Encrypting d) None of these
Last Answer : a) Black hat
Description : Governments hired some highly skilled hackers. These types of hackers are termed as _______ a) Special Hackers b) Government Hackers c) Cyber Intelligence Agents d) Nation / State sponsored hackers
Last Answer : d) Nation / State sponsored hackers
Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers
Last Answer : c) Cyber Terrorists
Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers
Last Answer : d) Black Hat Hackers
Description : Tools used by ethical hackers……….. a. Scanner b. Decoder c. Proxy d. All of these
Last Answer : a. Scanner
Description : Which of the following statements best describes why the profession of certified public accountants has deemed it essential to promulgate a code of ethics and to establish a mechanism for ... self-protection for the profession is the establishment of flexible ethical standards by the profession
Last Answer : A distinguishing mark of a profession is its acceptance of responsibility to the public
Description : Which statement is incorrect regarding the Code of Ethics for Professional Accountants in the Philippines? a. Professional accountants refer to persons who are Certified Public Accountants (CPA) ... the ethical requirements as the basic principles which they should follow in performing their work
Last Answer : Where a national statutory requirement is in conflict with a provision of the IFAC Code, the IFAC Code requirement prevails.
Description : What are the typical pre-requisite recommendations for CEH training?
Last Answer : You will need knowledge of Windows 95-XP-Vista-7 and NT, also mainly you wil need to know Linux in some form or other to a high level of useage. You will also need to know how TCP/IP networking ... know PHP Java or C++ then so much the better. Basic knowledge of the internet and hardware is good.
Description : What is the best ceh training?
Last Answer : INFOSAVVY’s Certified Ethical Hacker | CEH training and certification boot camp will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. Certified ... with access to over 2200 commonly used hacking tools to immerse you into the hacker worl
Description : How long does CEH certification take?
Last Answer : To finish a CEH certification is takes variable amounts of time, for some it can take months other hours or weeks depending on your level of mastery. One website I found offers a 5 day bootcamp for CEH training, the link is: http://www.cedsolutions.com
Description : Where can I get CEH certification?
Last Answer : You may get this certification at http://www.eccouncil.org/certification/certified_ethical_hacker.aspx. This is an information security training program which teaches you to fight against hackers.
Description : CVE stands for: a) Common Vulnerabilities Exposures b) Cyber Vulnerabilities Exposures c) Cycolic Vulnerabilities Exposures d) None of These
Last Answer : a) Common Vulnerabilities Exposures
Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?
Last Answer : This is not a question.
Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology
Last Answer : 1. True2. True3. False4. False
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : Computer Hackers have been in existence for more than a____. A. Decade. B. Year. c Century D. Era.
Last Answer : c Century
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : The Stock Exchange, United Airlines and The Wall Street Journal experience computer glitches almost simultaneously 7-8-15. Is the US experiencing a cyber assault?
Last Answer : Nope. Simultaneity is not correlation and is not causation or connectedness. And the stock market was open all day yesterday, it was one exchange out of dozens that was offline.
Description : What is a computer cyber crime?
Last Answer : Cyber crimes are crimes that are perpetrated with the use of a computer. An example might be where someone uses a pc to illegally obtain someone else's personal information and then the "bad ... information to steal money from the victim. Simply, cyber crime is crime committed using a computer.
Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Last Answer : b. Cyber Terrorism
Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these
Last Answer : b. Computer Law
Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim
Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity
Last Answer : b) Cyber
Description : ___________ includes the identification, recovery, investigation, validation and presentation of facts regarding digital evidence found on computer and similar storage media devices. a. Analog forensic b. Digital forensic c. Cyber forensic
Last Answer : b. Digital forensic
Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic
Description : ______ is a branch of computer science which deals with helping machines finds solutions to complex problems in a more human like fashions A. Artificial Intelligence B. Internet of Things C. Embedded System D. Cyber Security
Last Answer : A. Artificial Intelligence
Description : Which was the first super computer purchased by India for medium range weather forecasting? (1) CrayXMP-14 (2) Medha - 930 (3) CDC Cyber 930-11 (4) Param
Last Answer : CrayXMP-14
Description : Are corporations and goverment agencies helpless against hackers for ransom?
Last Answer : If they can get through the Anti-virus programs and the firewalls then yup.
Description : Can hackers use your webcam without making the indicator light turn on?
Last Answer : I don’t think that’s possible not 100% sure though.
Description : If the hackers of Yahoo have the the password how do people sign in?
Last Answer : If you remember the password ( I hope) and if hasn’t been updated by hackers ( hopefully) then you don’t need security question information to change your password. You’ll require it only when you have forgotten your password.
Description : What do hackers get when they hack a Facebook profile?
Last Answer : For one thing, many people use the same password for multiple websites.
Description : How to report hackers on Runescape?
Last Answer : answer:I believe there’s a contact link somewhere on the support site. If you can tell them your original password as proof that you really own the account they’ll probably give it back to you. I hope you have set a bank pin, so even if the hackers got your account, they can’t empty your bank.
Description : What exactly can hackers do with your bank account number?
Last Answer : answer:They can empty your account if they want. I think it was Jeremy Clarkson of Top Gear who also mocked this, and he showed his bank account number on TV, thinking that you couldn't do ... lost money from his account. Don't give your bank account number to people you do not trust completely.
Description : Was it just a matter of time before our cellphones were hit by hackers?
Last Answer : Of course! But if you think that’s bad, just wait until there’s a direct computer-to-brain interface and people start hacking THAT! One morning you’ll wake up naked and sore in a strange bed, the victim of “brain-hacking!” Mwahahaha! : D
Description : Is this site (see inside) as safe from hackers as they claim to be?
Last Answer : I don't like trusting any site with any more information than I have to. I keep it all on my machine at home. If someone wants it, they could break in and steal the machine and if they worked really ... in my head and probably couldn't be figured out. It is not susceptible to hacking, I don't think.
Description : Was there news about hackers hacked (added: all the) Fortune 500 companies last week?
Last Answer : First I’ve heard of it.
Description : How can we defend ourselves against the new social sites bot hackers?
Last Answer : I’m glad I have Norton 360 virus protection then. It has keystroke protection so hackers can’t tell what numbers or letters I’m entering when I’m typing. How to combat the problem other than virus protection programs? I really don’t know.
Description : Firefox (remmeber password or Master Pw feature) Safe from hackers?
Last Answer : answer:Unplug your phone cable. Done that? Now you're safe. It's unlikely that someone will specifically pick on you to get your password. But sure, if someone found your master password and had access to ... 't be that paranoid, surely, I hope all goes well though and that you never get hacked :)
Description : Differentiate between hackers and crackers. -Technology
Last Answer : Differences between hackers and crackers are as follows:HackersCrackersA hacker is a person intensely interested inthe arcane and recondite working of anycomputer operating system.A cracker ... andnever intentionally damage data.Crackers can easily be identified because theiractions are malicious.