Ethical Hacking on Cyber Security related Questions and Answers - Page 1

Question 1 : Someone (from outside) who tests security issues for bugs before launching a system or application, and who is not a part of that organization or company are ______
1. Black Hat hacker
2. External penetration tester
3. Blue Hat hacker
4. White Hat Hacker
View Answer   Discuss with Members

Question 2 : Governments hired some highly skilled hackers. These types of hackers are termed as _______
1. Special Hackers
2. Government Hackers
3. Cyber Intelligence Agents
4. Nation / State sponsored hackers
View Answer   Discuss with Members

Question 3 : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.
1. Database
2. Network
3. System
4. Hardware
View Answer   Discuss with Members

Question 4 : ________ are senior level corporate employees who have the role and responsibilities of creating and designing secured network or security structures.
1. Ethical Hackers
2. Chief Technical Officer
3. IT Security Engineers
4. Security Architect
View Answer   Discuss with Members

Question 5 : _________ are those individuals who maintain and handles IT security in any firm or organization.
1. IT Security Engineer
2. Cyber Security Interns
3. Software Security Specialist
4. Security Auditor
View Answer   Discuss with Members

Question 6 : One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________
1. Sponsored hackers
2. Crackers
3. Hactivist
4. Whistleblowers
View Answer   Discuss with Members

Question 8 : Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
1. Cracking
2. Non ethical Hacking
3. Ethical hacking
4. Hactivism
View Answer   Discuss with Members

Question 9 : _____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
1. PGP (Protected Good Privacy)
2. AES (Advanced Encryption Standard)
3. PGP (Pretty Good Privacy)
4. DES (Data Encryption Standard)
View Answer   Discuss with Members

Question 10 : Who was the first individual to distribute computer worms through internet?
1. Vladimir Levin
2. Bill Landreth
3. Richard Stallman
4. Robert T. Morris
View Answer   Discuss with Members


View 1 - 10 of 18 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter