MCQs
Total Questions : 66
| Page 6 of 7 pages
Answer: Option C. -> bomb
Answer: (c)
Answer: (c)
Answer: Option B. -> hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
Answer: (b)
Answer: (b)
Answer: Option B. -> a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer: (b)
Answer: (b)
Answer: Option C. -> By opening emails
Answer: (c)
Answer: (c)
Answer: Option C. -> retain confidentiality of files
Answer: (c)
Answer: (c)
Answer: Option A. -> White hat
Answer: (a)
A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking.
White hat hackers only seek vulnerabilities or exploits when they are legally permitted to do so. White hat hackers may do their research on open source software, as well as on software or systems they own or have been authorized to investigate, including products and services that operate bug bounty programs. These types of programs reward individuals with money for disclosing security flaws.
Answer: (a)
A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking.
White hat hackers only seek vulnerabilities or exploits when they are legally permitted to do so. White hat hackers may do their research on open source software, as well as on software or systems they own or have been authorized to investigate, including products and services that operate bug bounty programs. These types of programs reward individuals with money for disclosing security flaws.
Answer: Option B. -> Borrowed copies of software
Answer: (b)
Answer: (b)
Answer: Option D. -> virus
Answer: (d)
A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects the other files and programs present on your system.
These computer viruses are present in various types and each of them can infect a device in a different manner.
Answer: (d)
A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects the other files and programs present on your system.
These computer viruses are present in various types and each of them can infect a device in a different manner.
Answer: Option C. -> an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
Answer: (c)
Answer: (c)
Answer: Option C. -> Firewall development
Answer: (c)
Firewall development is not a primary category of procedures.
Firewalls are defined as software or hardware device installed at the point where a network connection enters an internal network. We proposed and developed an improved software-based solution that allows all the inbound and outbound traffic to pass through the firewall.
Answer: (c)
Firewall development is not a primary category of procedures.
Firewalls are defined as software or hardware device installed at the point where a network connection enters an internal network. We proposed and developed an improved software-based solution that allows all the inbound and outbound traffic to pass through the firewall.