7000+ Cyber Security Quiz Questions and Answers Pdf - 2

Question: 6

Blue Hat is?

(A) Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed

(B) Hacker of ambiguous ethics and/or borderline, legally, often frankly admitted

(C) Hacker breaks security for altruistic or at least non malicious reasons

(D) None of these

Ans: A

Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed

Question: 7

Hacktivism is?

(A) Hacker who utilizes technology to announce a political message

(B) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others

(C) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism, credit card fraud, identify theft, intellectual property theft, or many other types of crime

(D) None of these

Ans: A

Hacker who utilizes technology to announce a political message

Question: 8

These hacker breaks security for altruistic or at least non malicious reasons.

(A) Blue hat

(B) Grey hat

(C) White hat

(D) None of these

Ans: C

White hat

Question: 9

These are program designed as to seen to being or be doing one thing, but actually being or doing another.

(A) Cracker

(B) Worm

(C) Keylogger

(D) Trojan horses

Ans: D

Trojan horses

Question: 10

It is a self replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(A) Virus

(B) Cracker

(C) Worm

(D) Keylogger

Ans: A

Virus

Related Questions