Et Unit 5
Et Unit 5
A. True
Information is a one of the most valuable assets of B. False
72
organization
A. Police
B. Forensics
73 To catch a thief, think like _____
C. Thief
D. Hacker
A. Firewall
B. Encryption
74 ._______can create false feeling of safety
C. VNPs
D. All the above
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 5 BASICS OF HACKING
A. Nontechnical attacks
.______ exploits that involves manipulating people and
B. Network infrastructure attack
75 user even your self are the greatest
vulnerability within any computer C. Operating system attack
D. Application and other specialized attack
A. Nontechnical attacks
Connecting into network through a rogue modem
B. Network infrastructure attack
76 attached to computer behind a firewall is an
example of ____- C. Operating system attack
D. Application and other specialized attack
A. Nontechnical attacks
.______ comprise of large portion of hacker attacks
B. Network infrastructure attack
77 simply because every computer has one
C. Operating system attack
and so well know exploits can be used against them
D. Application and other specialized attack
A. Data gathering.
B. Attacking
78 .______ should be done before ethical hacking process.
C. Planning
D. Research
A. Written permission.
B. Decision maker permission
79 Which permission is necessary before ethical hacking?
C. Privacy permission
D. Risk permission.
A. Nmap
B. LC4
80 Which tool is used to crack the password?
C. ToneLOC
D. Nessus
A. Whisker
Which tool is used for depth analysis of a web B. Super scan
81
application? C. Nikto
D. Kismet
A. WebInspect
B. QualyGuard
82 Which tool is used to encrypt Email?
C. PGP (pretty good privacy)
D. None of the above.
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 5 BASICS OF HACKING
A. Thieves
83 Malicious attacker often think like? B. Kidnapper
C. Both A & B
D. None of the above
A. Black hat hacker
Which hacker try to distribute political or social message B. Hactivist
84
through their work? C. Script kiddes
D. White hat hacker
A. Criminal
B. Antinationalist
85 ._______ are part of organized crime on internet.
C. Hacker for hire
D. None of the above
A. 2600
B. Hackin9
86 Which magazines releases the latest hacking methods?
C. PHRACK
D. All the above
A. a good
Performing a shoulder surfing in order to check other’s
B. not so good
87 password is ____________ ethical
C. very good social engineering practice
practice.
D. a bad
A. Automated apps
___________ has now evolved to be one of the most
B. Database software
88 popular automated tools for unethical
C. Malware
hacking.
D. Worms
A. True
Leaking your company data to the outside network
B. False
89 without prior permission of senior authority
is a crime.
A penetration tester must identify and keep in mind the A. privacy and security
___________ & ___________ B. rules and regulations
90
requirements of a firm while evaluating the security C. hacking techniques
postures. D. ethics to talk to seniors
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 5 BASICS OF HACKING
A. stealing
zation.