cyber security and element set 26

Que.Which of the following do not comes under the intangible skills of hackers?
a. Creative thinking
b. Problem-solving capability
c. Persistence
d. Smart attacking potential
Que.Why programming language is important for ethical hackers and security professionals?
a. Only to write malware
b. For solving problems and building tool and programs
c. To teach programming
d. To develop programs to harm others
Que.Understanding of ___________ is also important for gaining access to a system through networks.
a. os
b. email-servers
c. networking
d. hardware
Que.For hacking a database or accessing and manipulating data which of the following language the hacker must know?
a. SQL
b. HTML
c. Tcl
d. F#
Que.Information Gathering about the system or the person or about organization or network is not important.
a. True
b. False
c. May be True or False
d. Can’t say
Que.________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.
a. Footprinting
b. Cyber-printing
c. OS fingerprinting
d. OS penetration testing
Que.How many types of fingerprinting are there in ethical hacking?
a. 5
b. 4
c. 3
d. 2
Que._______________________ is gained if you send especially skilled packets to a target machine.
a. Active fingerprinting
b. Passive fingerprinting
c. OS fingerprinting
d. Network fingerprinting
Que._______________________ is based on sniffer traces from the remote system.
a. Active fingerprinting
b. Passive fingerprinting
c. OS fingerprinting
d. Network fingerprinting
Que.How many basic elements are there for OS fingerprinting?
a. 2
b. 3
c. 4
d. 5