cyber security and element set 28

Que.________________ are piece of programs or scripts that allow hackers to take control over any system.
a. Exploits
b. Antivirus
c. Firewall by-passers
d. Worms
Que.The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________
a. infiltrating
b. exploitation
c. cracking
d. hacking
Que.Which of them is not a powerful vulnerability detecting tool?
a. Nessus
b. Nexpose
c. Metasploit
d. Nmap
Que.__________ is the specific search engine for exploits where anyone can find all the exploits associated to vulnerability.
a. Google
b. Bing
c. Exploit-db
d. Exploit-engine
Que.Which of the following are not a vulnerability-listed site/database?
a. Exploit-db
b. Common Vulnerabilities and Exposures (CVE)
c. National Vulnerability Database (NVD)
d. Bing Vulnerability database (BVD)
Que.There are __________ types of exploits based on their working.
a. two
b. three
c. four
d. five
Que.How many types of exploits are there based on their nature from hacking’s perspective?
a. 4
b. 3
c. 2
d. 5
Que.Known exploits have a confirmation of and measures can be taken against it to resolve them.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies.
a. True
b. False
c. May be True or False
d. Can’t say
Que.A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it.
a. scratch
b. patch
c. fixer
d. resolver