Test your understanding about hacking

  1. Question 1. What is a hacker?
    1. Get access to other computers that they are not allowed
    2. Find someone's password
    3. Use in-game code to get everything
  2. Question 2. Is a hack considered legitimate work?
    1. Illegal
    2. Legal
    3. Use "golden rule"
  3. Question 3. What are the two types of hackers in hacking?
    1. Types 1 and 2
    2. Type A and Type B
    3. White and gray hackers
    4. Black and red Hackers
  4. Question 4. What is the type 1 hacker job?
    1. There is nothing wrong when they hack
    2. Just search around or make small changes to the computer system
    3. Trying to protect your computer
  5. Question 5. What is the type 2 hacker job?
    1. Stealing information and causing damage to your computer system
    2. Just search around or make small changes to the computer system
    3. Trying to protect your computer
  6. Question 6. Why hackers hack?
    1. Because they protect your computer
    2. Get access to credit card numbers, social security records and bank account numbers
    3. Just search around or make small changes to the computer system
  7. Question 7. If other people snoop on your computer, it is not called a hacker
    1. It's correct
    2. False
  8. Question 8. Hackers steal identity?
    1. Have
    2. Is not
  9. Question 9. When is considered a legal hack
    1. Hacking is never legal
    2. Hacking is always legal
    3. Hired by a company to check firewall security
4 ★ | 2 Vote

May be interested

  • Basic hacking techniques - Part IIBasic hacking techniques - Part II
    if the foot printing is collecting all the information related to the destination organization, scan is a step to determine if the other is usable by ping scans, port scanning and detection tools. automatic
  • [QUIZ] Test your understanding of SQL - Part 4[QUIZ] Test your understanding of SQL - Part 4
    let's try our knowledge with multiple choice questions about sql database management system.
  • IoT smart watches can put children in dangerIoT smart watches can put children in danger
    the internet of things (iot) has been, will and will bring a complete change to human life, but it will also bring us a lot of troubles.
  • Learn about Ethical hacking using Kali Linux and Raspberry PiLearn about Ethical hacking using Kali Linux and Raspberry Pi
    a raspberry pi 3 runs kali linux for building amazing hacking skills. this small computer is cheap, powerful and very flexible.
  • Growth Hacking growth strategy - Part 1Growth Hacking growth strategy - Part 1
    along with the development of connectivity technology, there are many ways to help you reach customers, promote your business more easily if you update trends in a timely manner. growth hacking is one of those new business strategies.
  • [QUIZ] Test your understanding of SQL - Part 7[QUIZ] Test your understanding of SQL - Part 7
    part 7 of the sql quiz goes into the sql practice exercises that follow the previous period.
  • Instagram account of a series of famous stars hacked and used as a means of fraudInstagram account of a series of famous stars hacked and used as a means of fraud
    the popular instagram account of the raid campaign after a period of cooling down has continued to heat up over the past few days.
  • IQ test, IQ test, IQ test, intelligence testIQ test, IQ test, IQ test, intelligence test
    iq test, iq test, iq test, intelligence test - iq stands for intelligence quotient is the intelligence index. you can test your intelligence by completing a test on the online testing tool. tools
  • Basic hacking techniques - Attendance - Part IIIBasic hacking techniques - Attendance - Part III
    assuming that the implementation of steps i and ii failed or the information obtained could not be sufficient to launch an instant attack, the hacker would switch to a method of identifying valid user accounts or unprotected shared resources enumeration is a way to extract valid accounts or resources from the system. in part iii, i will detail the most common methods, and the basic tools of attendance technology - step one
  • Test about database security P8Test about database security P8
    database (database) is a complex and very difficult field to complete, because in addition to understanding the structure, computer system, to complete a database of database designers, there must be thinking. , ability to analyze and recognize good issues. the following test on database will be helpful to test your knowledge.