Cyber Security

51) who was the first individual who performed a major hacking in the year1971?

Answer Is: (D) john draper

Explanation:

No answer description available for this question. Let us discuss.

52) how many basic processes or steps are there in ethical hacking?

Answer Is: (C) 6

Explanation:

No answer description available for this question. Let us discuss.

53) ____________is a code injecting method used for attracking the database of a system/website.

Answer Is: (C) sql injection

Explanation:

No answer description available for this question. Let us discuss.

54) it act under section_______imposes fine life imprisonnment for cyber terrorism.

Answer Is: (C) 66f

Explanation:

No answer description available for this question. Let us discuss.

55) there___are subtypes of reconnaissance.

Answer Is: (A) 2

Explanation:

No answer description available for this question. Let us discuss.

56) stuxnet is a _______

Answer Is: (D) worm

Explanation:

No answer description available for this question. Let us discuss.

57) full name of esp is_______

Answer Is: (D) encapsulating secure payload

Explanation:

No answer description available for this question. Let us discuss.

58) which of the following is not a reconnaissance toolm or technique for information gathering?

Answer Is: (D) nexpose

Explanation:

No answer description available for this question. Let us discuss.

59) firewell are_______

Answer Is: (D) none of the above

Explanation:

No answer description available for this question. Let us discuss.

60) which of them is not a scanning tool?

Answer Is: (C) maltego

Explanation:

No answer description available for this question. Let us discuss.

61) full name of sip is_____in cyber security

Answer Is: (A) session initiationprotocol

Explanation:

No answer description available for this question. Let us discuss.

62) security should be implemented at the stage of_____in software.

Answer Is: (D) all of them

Explanation:

No answer description available for this question. Let us discuss.

63) which of the following is not a type of cyber crime?

Answer Is: (D) installilng antivirus for protection

Explanation:

No answer description available for this question. Let us discuss.

64) in which year the indian it act,2000 got updated?

Answer Is: (B) 2008

Explanation:

No answer description available for this question. Let us discuss.

65) which of them is not a wireless attack?

Answer Is: (D) phishing

Explanation:

No answer description available for this question. Let us discuss.

66) which is the legal form of hacking based on which jobs are provided in IT industries and firms?

Answer Is: (C) ethical hacking

Explanation:

No answer description available for this question. Let us discuss.

67) in which year india's it act came into existence?

Answer Is: (A) 2000

Explanation:

No answer description available for this question. Let us discuss.

68) gitting the user id and password from a victim through dubious program is called_____

Answer Is: (A) trojans

Explanation:

No answer description available for this question. Let us discuss.

69) what is the updated version of the it act,2000?

Answer Is: (C) it act,2008

Explanation:

No answer description available for this question. Let us discuss.

70) ________monitors user activity on internet and transmit that information in the background to someone else.

Answer Is: (B) spyware

Explanation:

No answer description available for this question. Let us discuss.

71) sending offensive message to someone comes under___of the indian it act_____

Answer Is: (D) section66-a,2008

Explanation:

No answer description available for this question. Let us discuss.

72) what is the one thing that old hackers were unauthorized access is called____security.

Answer Is: (B) voracions thirst for knowledge

Explanation:

No answer description available for this question. Let us discuss.

73) in which year the computer fraud&abuse act was adopted in the united states?

Answer Is: (B) 1984

Explanation:

No answer description available for this question. Let us discuss.

74) ai,s of it act is_______

Answer Is: (C) both a&b

Explanation:

No answer description available for this question. Let us discuss.

75) full name of sftp is_________

Answer Is: (A) secure file transfer protocol

Explanation:

No answer description available for this question. Let us discuss.

76) authentication in pct requires____keys.

Answer Is: (B) 2

Explanation:

No answer description available for this question. Let us discuss.

77) in which year the term hacking was coind?

Answer Is: (B) 1955-60

Explanation:

No answer description available for this question. Let us discuss.

Comments (0)

Leave your comment

Please enter comment.

Please enter name.
Please enter valid email address.
Please enter valid website URL.

Up