0% found this document useful (0 votes)
39 views

6wb ETI

The document is a workbook for a computer engineering course on network and system vulnerabilities. It contains questions about types of hackers such as white hat and black hat hackers, phases of hacking like reconnaissance and different types of attacks like remote attacks.

Uploaded by

snehadhavale08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

6wb ETI

The document is a workbook for a computer engineering course on network and system vulnerabilities. It contains questions about types of hackers such as white hat and black hat hackers, phases of hacking like reconnaissance and different types of attacks like remote attacks.

Uploaded by

snehadhavale08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

JSPM’s

RAJARSHI SHAHU COLLEGE OF ENGINEERING,


POLYTECHNIC

Department of Computer Engineering


Academic Year 2023-24

Workbook-5

Course: ETI Course Code: 22618


Course & Code: CO6I Class: TYCO
Semester: Sixth Name of the Faculty: Mrs.S.P.Sabat
Date:

CO 6: Detect Network, Operating System and applications vulnerabilities.

CHAPTER 6: Types of Hacking


1. Which of the following statements best describes a white-hat hacker?
A. Security professional

B. Former black hat

C. Former grey hat

D. Malicious hacker

Answer..

2. A security audit performed on the internal network of an organization by the


network administration is also known as ___________.

A. Grey-box testing

B. Black-box testing

C. White-box testing

D. Active testing

E. Passive testing
Answer.

3. What is the first phase of hacking?

A. Attack

B. Maintaining access

C. Gaining access

D. Reconnaissance

E. Scanning

Answer.
4. What type of ethical hack tests access to the physical infrastructure?

A. Internal network

B. Remote network

C. External network

D. Physical access

Answer.
5. The security, functionality, and ease of use triangle illustrates which concept?

A. As security increases, functionality and ease of use increase.

B. As security decreases, functionality and ease of use increase.

C. As security decreases, functionality and ease of use decrease.

D. Security does not affect functionality and ease of use.

Answer.
6. Which type of hacker represents the highest risk to your network?

A. Disgruntled employees
B. Black-hat hackers

C. Grey-hat hackers

D. Script kiddies

Answer.
7. What are the three phases of a security evaluation plan? (Choose three
answers.)

A. Conduct Security Evaluation

B. Preparation

C. Conclusion

D. Final

E. Reconnaissance

F. Design Security

G. Vulnerability Assessment

Answer.
8. Hacking for a cause is called __________________.

A. Active hacking

B. Hacktivism

C. Activism

D. Black-hat hacking

Answer.
9. Which federal law is most commonly used to prosecute hackers?

A. Title 12

B. Title 18
C. Title 20

D. Title 2

Answer.
10. When a hacker attempts to attack a host via the Internet it is known as what
type of attack?

A. Remote attack

B. Physical access

C. Local access

D. Internal attack

Answer.

Course Teacher HOD

You might also like