Untitled
Untitled
Hacking.
C. Encryption.
D. None of these.
Ans. B
A. Scanner
B. Decoder
C. Proxy
D. All of these.
Ans. D
Strengths.
B. Weakness.
C. A &B
D. None of these.
Ans. B
breaches. A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
D. Gaining Access.
Chapter 5 Basics of Hacking (CO5)
A. B, C, D, A
B. B, A, C, D C. A, B, C, D
D. D, C, B, A
Ans. A
IT Engineering.
C. Ethical Hacking.
Ans. A
hacker.
Ans. B
Ans. A
attitude? A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman.
Ans. B
Chapter 5 Basics of Hacking (CO5)
Decade.
B. Year.
C. Century
D. Era.
Ans. C
Fame.
B. Profit.
C. Revenge.
Ans. D
12.The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system.
A. Victims.
B. Attackers.
Ans. B
B. Checklists.
C. Both A & B
Ans. B
Penetration testing.
B. Intrusion testing.
C. Red teaming.
Chapter 5 Basics of Hacking (CO5)
Ans. D
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
Ans. B
Ans. A
Ans. C
19. Keeping information secured can protect an organization image and save and organization lot
of money
Chapter 5 Basics of Hacking (CO5)
A. True
B. False
Ans. A
A. True
B. False
Ans. A
A. Police
B. Forensics
C. Thief
D. Hacker
Ans. C
A. Firewall
B. Encryption
C. VNPs
Ans. D
23.______ exploits that involves manipulating people and user even your self are the greatest
A. Nontechnical attacks
Ans. A
Chapter 5 Basics of Hacking (CO5)
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
A. Nontechnical attacks
Ans. C
Data gathering.
B. Attacking C.
Planning
D. Research
Ans. C
Written permission.
permission.
Ans. A
Chapter 5 Basics of Hacking (CO5)
A. Nmap
B. LC4
C. ToneLOC
D. Nessus
Ans. B
A. Whisker
B. Super scan
C. Nikto
D. Kismet Ans. A
A. WebInspect
B. QualyGuard
Ans. C
A. Thieves
B. Kidnapper
C. Both A & B
Ans. C
32.Which hacker try to distribute political or social message through their work?
B. Hactivist
Chapter 5 Basics of Hacking (CO5)
C. Script kiddes
Ans. B
A. Criminal
B. Antinationalist
Ans. C
A. 2600
B. Hackin9
C. PHRACK
Ans. D
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
D. a bad Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
Chapter 5 Basics of Hacking (CO5)
37. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
C. hacking techniques
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data. A.
stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
Ans. D