Information security test has the answer P3

Information security is an essential job in the technology era 4.0 today. Good security will help your data and information avoid unnecessary risks for your personal and business. Please read below with the Network Administrator for information security and privacy through multiple-choice questions below.
  1. Question 1. Which of the following statements best describes a white hat hacker?
    1. Security specialist
    2. Former Hacker black hat
    3. Former Hacker gray hat
    4. Malicious hackers
  2. Question 2. What is the first stage of hacking?
    1. Maintain access
    2. Gaining access
    3. Reconnaissance
    4. Detection (Scanning)
  3. Question 3. When a hacker tries to attack a server over the Internet it is called the attack type?
    1. Attack from a distance
    2. Physical access attack
    3. Local access
    4. Attack attacks internal
  4. Question 4. Which of the following tools is a tool to perform undetected footprinting?
    1. Whois search
    2. Traceroute
    3. Ping sweep
    4. Host scanning
  5. Question 5. What will be the next step after footprinting?
    1. Scanning
    2. Enumeration
    3. System hacking
    4. Active information gathering
  6. Question 6. What is Footprinting?
    1. Measure the trail of a moral hacker
    2. Accumulate data by collecting information about a goal
    3. Scan a target network to detect operating systems of all kinds
    4. The physical layout of a target network
  7. Question 7. What is the best reason to implement a security policy?
    1. Increase security
    2. It makes it harder to enforce security
    3. Restrict employee rights
    4. Reduce security
  8. Question 8. What port does FTP use?
    1. 21
    2. 23
    3. 25
    4. 80
  9. Question 9. Which port is used by HTTPS?
    1. 21
    2. 80
    3. 443
    4. 53
  10. Question 10. What is Trojan Horse?
    1. A malicious program that steals your username and password
    2. An unauthorized user who collects access to your user database and adds himself as a user
    3. Causing harm like fake code or replacing legal code
    4. A server that is to sacrifice for all hacking attempts to log in and monitor hacking activities
4.5 ★ | 2 Vote