Cyber Security

51) who was the first individual who performed a major hacking in the year1971?

Answer Is: (D) john draper

Explanation:
No answer description available for this question. Let us discuss.

52) how many basic processes or steps are there in ethical hacking?

Answer Is: (C) 6

Explanation:
No answer description available for this question. Let us discuss.

53) ____________is a code injecting method used for attracking the database of a system/website.

Answer Is: (C) sql injection

Explanation:
No answer description available for this question. Let us discuss.

54) it act under section_______imposes fine life imprisonnment for cyber terrorism.

Answer Is: (C) 66f

Explanation:
No answer description available for this question. Let us discuss.

55) there___are subtypes of reconnaissance.

Answer Is: (A) 2

Explanation:
No answer description available for this question. Let us discuss.

56) stuxnet is a _______

Answer Is: (D) worm

Explanation:
No answer description available for this question. Let us discuss.

57) full name of esp is_______

Answer Is: (D) encapsulating secure payload

Explanation:
No answer description available for this question. Let us discuss.

58) which of the following is not a reconnaissance toolm or technique for information gathering?

Answer Is: (D) nexpose

Explanation:
No answer description available for this question. Let us discuss.

59) firewell are_______

Answer Is: (D) none of the above

Explanation:
No answer description available for this question. Let us discuss.

60) which of them is not a scanning tool?

Answer Is: (C) maltego

Explanation:
No answer description available for this question. Let us discuss.

61) full name of sip is_____in cyber security

Answer Is: (A) session initiationprotocol

Explanation:
No answer description available for this question. Let us discuss.

62) security should be implemented at the stage of_____in software.

Answer Is: (D) all of them

Explanation:
No answer description available for this question. Let us discuss.

63) which of the following is not a type of cyber crime?

Answer Is: (D) installilng antivirus for protection

Explanation:
No answer description available for this question. Let us discuss.

64) in which year the indian it act,2000 got updated?

Answer Is: (B) 2008

Explanation:
No answer description available for this question. Let us discuss.

65) which of them is not a wireless attack?

Answer Is: (D) phishing

Explanation:
No answer description available for this question. Let us discuss.

66) which is the legal form of hacking based on which jobs are provided in IT industries and firms?

Answer Is: (C) ethical hacking

Explanation:
No answer description available for this question. Let us discuss.

67) in which year india's it act came into existence?

Answer Is: (A) 2000

Explanation:
No answer description available for this question. Let us discuss.

68) gitting the user id and password from a victim through dubious program is called_____

Answer Is: (A) trojans

Explanation:
No answer description available for this question. Let us discuss.

69) what is the updated version of the it act,2000?

Answer Is: (C) it act,2008

Explanation:
No answer description available for this question. Let us discuss.

70) ________monitors user activity on internet and transmit that information in the background to someone else.

Answer Is: (B) spyware

Explanation:
No answer description available for this question. Let us discuss.

71) sending offensive message to someone comes under___of the indian it act_____

Answer Is: (D) section66-a,2008

Explanation:
No answer description available for this question. Let us discuss.

72) what is the one thing that old hackers were unauthorized access is called____security.

Answer Is: (B) voracions thirst for knowledge

Explanation:
No answer description available for this question. Let us discuss.

73) in which year the computer fraud&abuse act was adopted in the united states?

Answer Is: (B) 1984

Explanation:
No answer description available for this question. Let us discuss.

74) ai,s of it act is_______

Answer Is: (C) both a&b

Explanation:
No answer description available for this question. Let us discuss.

75) full name of sftp is_________

Answer Is: (A) secure file transfer protocol

Explanation:
No answer description available for this question. Let us discuss.

76) authentication in pct requires____keys.

Answer Is: (B) 2

Explanation:
No answer description available for this question. Let us discuss.

77) in which year the term hacking was coind?

Answer Is: (B) 1955-60

Explanation:
No answer description available for this question. Let us discuss.

Comments (1)

D
Divanjulu dasupalli 17, Apr 2023

Its very good, thanks

Leave your comment

Please enter comment.

Please enter name.
Please enter valid email address.
Please enter valid website URL.

Up