Document
Document
C. Encryption.
D. None of
these. Ans. B
A. Scanner
B. Decoder
C. Proxy
D. All of
these. Ans. D
A. Strengths.
B. Weakness.
C. A CB
D. None of
these. Ans. B
A. Remove.
B. Measure.
C. Reject.
D. None of
these. Ans. B
5. Sequential step hackers use are: _ _ _ _.
A. Maintaining Access.
B. Reconnaissance
C. Scanning.
D. Gaining Access.
A. B, C, D,A
B. B, A, C,D
C. A, B, C,D
D. D, C, B,A
Ans. A
6. is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the
above. Ans. A
D. None of the
above. Ans. A
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon
Browman. Ans. B
A. Decade.
B. Year.
C. Century
D. Era.
Ans. C
A. Fame.
B. Profit.
C. Revenge.
D. All the
above Ans. D
11. The intent of ethical hacker is to discover vulnerabilities from a point of view
A. Victims.
B. Attackers.
C. Both A C B
D. None
ofthese. Ans. B
A. Entries.
B. Checklists.
C. Both A C B
D. None of the
above Ans. B
A. Penetration testing.
B. Intrusion testing.
C. Red teaming.
D. All of the
above. Ans. D
14. is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the
above. Ans. B
D. None of the
above Ans. A
D. None of the
above Ans. C
of money
A. True
B. False
Ans. A
A. True
B. False
Ans. A
A. Police
B. Forensics
C. Thief
D. Hacker
Ans. C
A. Nontechnical attacks
attack Ans. B
22. comprise of large portion of hacker attacks simply because every computer has
A. Nontechnical attacks
C. Operating systemattack
attack Ans. C
A. Data gathering.
B. Attacking
C. Planning
D. Research
Ans. C
A. Written permission.
C. Privacy permission
D. Risk
permission. Ans. A
B. LC4
C. ToneLOC
D. Nessus
Ans. B
A. WebInspect
B. QualyGuard
D. None of the
above. Ans. C
A. Thieves
B. Kidnapper
C. Both A C B
D. None of the
above Ans. C
28. Which hacker try to distribute political or social message through their work?
B. Hactivist
C. Script kiddes
D. White hat
hacker Ans. B
A. Criminal
B. Antinationalist
D. None of the
above Ans. C
30. Leaking your company data to the outside network without prior permission of
A. True
B. False
Ans. A
postures.
C. hacking techniques
D. ethics to talk to
seniors Ans. A
32 The legal risks of ethical hacking include lawsuits due to of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
33. Before performing any penetration test, through legal procedure, which key points
firm Ans. D