Information security test has the answer P3
- Question 1. Which of the following statements best describes a white hat hacker?
- Security specialist
- Former Hacker black hat
- Former Hacker gray hat
- Malicious hackers
-
- Question 2. What is the first stage of hacking?
- Maintain access
- Gaining access
- Reconnaissance
- Detection (Scanning)
-
- Question 3. When a hacker tries to attack a server over the Internet it is called the attack type?
- Attack from a distance
- Physical access attack
- Local access
- Attack attacks internal
-
- Question 4. Which of the following tools is a tool to perform undetected footprinting?
- Whois search
- Traceroute
- Ping sweep
- Host scanning
-
- Question 5. What will be the next step after footprinting?
- Scanning
- Enumeration
- System hacking
- Active information gathering
-
- Question 6. What is Footprinting?
- Measure the trail of a moral hacker
- Accumulate data by collecting information about a goal
- Scan a target network to detect operating systems of all kinds
- The physical layout of a target network
-
- Question 7. What is the best reason to implement a security policy?
- Increase security
- It makes it harder to enforce security
- Restrict employee rights
- Reduce security
-
- Question 8. What port does FTP use?
- 21
- 23
- 25
- 80
-
- Question 9. Which port is used by HTTPS?
- 21
- 80
- 443
- 53
-
- Question 10. What is Trojan Horse?
- A malicious program that steals your username and password
- An unauthorized user who collects access to your user database and adds himself as a user
- Causing harm like fake code or replacing legal code
- A server that is to sacrifice for all hacking attempts to log in and monitor hacking activities
-
4.5 ★ | 2 Vote