Free computer quiz Online Test - MeritNotes

No. of Questions :10
Remaining Time :
1. These hacker breaks security for altruistic or at least non malicious reasons.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

2. It is an application that capture TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit within the computer or over the network.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

3. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

4. A vulnerability scanner is?
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

5. It is a software program designed to record every keystroke on the machine on which it runs
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

6. Spooking attack is?
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

7. Hacktivism is?
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

8. It is a self replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

9. These are program designed as to seen to being or be doing one thing, but actually being or doing another.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

10. Blue Hat is?
 
  • (a) 
  • (b) 
  • (c) 
  • (d)