Que.Which of the following do not comes under the intangible skills of hackers?
|
a. Creative thinking |
b. Problem-solving capability |
c. Persistence |
d. Smart attacking potential |
Smart attacking potential
Que.Why programming language is important for ethical hackers and security professionals?
|
a. Only to write malware |
b. For solving problems and building tool and programs |
c. To teach programming |
d. To develop programs to harm others |
For solving problems and building tool and programs
Que.Understanding of ___________ is also important for gaining access to a system through networks.
|
a. os |
b. email-servers |
c. networking |
d. hardware |
Que.For hacking a database or accessing and manipulating data which of the following language the hacker must know?
|
a. SQL |
b. HTML |
c. Tcl |
d. F# |
Que.Information Gathering about the system or the person or about organization or network is not important.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.
|
a. Footprinting |
b. Cyber-printing |
c. OS fingerprinting |
d. OS penetration testing |
Que.How many types of fingerprinting are there in ethical hacking?
|
a. 5 |
b. 4 |
c. 3 |
d. 2 |
Que._______________________ is gained if you send especially skilled packets to a target machine.
|
a. Active fingerprinting |
b. Passive fingerprinting |
c. OS fingerprinting |
d. Network fingerprinting |
Que._______________________ is based on sniffer traces from the remote system.
|
a. Active fingerprinting |
b. Passive fingerprinting |
c. OS fingerprinting |
d. Network fingerprinting |
Que.How many basic elements are there for OS fingerprinting?
|
a. 2 |
b. 3 |
c. 4 |
d. 5 |