Test Series - cyber security

Test Number 13/13

Q: Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________
A. Black Hat hackers
B. White Hat Hackers
C. Grey Hat Hackers
D. Red Hat Hackers
Solution: White Hat Hackers are cyber security analysts and consultants who have the intent to help firms and Governments in the identification of loopholes as well as help to perform penetration tests for securing a system.
Q: Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
A. Cracking
B. Non ethical Hacking
C. Ethical hacking
D. Hactivism
Solution: Ethical Hacking is an ethical form of hacking done by white-hat hackers for performing penetration tests and identifying potential threats in any organizations and firms.
Q: They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
A. Gray Hat Hackers
B. White Hat Hackers
C. Hactivists
D. Black Hat Hackers
Solution: Black Hat hackers also termed as ‘crackers’ and are a major type of cyber criminals who take unauthorized access in user’s account or system and steal sensitive data or inject malware into the system for their profit or to harm the organization.
Q: ______ are the combination of both white as well as black hat hackers.
A. Grey Hat hackers
B. Green Hat hackers
C. Blue Hat Hackers
D. Red Hat Hackers
Solution: Grey Hat Hackers have a blending character of both ethical as well as un-ethical hacker. They hack other’s systems for fun but do not harm the system, exploits bugs and vulnerabilities in network without the knowledge of the admin or the owner.
Q: The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________
A. Sponsored Hackers
B. Hactivists
C. Script Kiddies
D. Whistle Blowers
Solution: Script Kiddies are new to hacking and at the same time do not have many interests in developing coding skills or find bugs of their own in systems; rather they prefer downloading of available tools (developed by elite hackers) and use them to break any system or network. They just try to gain attention of their friend circles.
Q: Suicide Hackers are those _________
A. who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity
B. individuals with no knowledge of codes but an expert in using hacking tools
C. who know the consequences of their hacking activities and hence try to prevent them by erasing their digital footprints
D. who are employed in an organization to do malicious activities on other firms
Solution: Suicide hackers are those who break into any network or system with or without knowing the consequences of the cyber crime and its penalty. There are some suicide hackers who intentionally do crimes and get caught to bring their names in the headlines.
Q: Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________
A. State sponsored hackers
B. Blue Hat Hackers
C. Cyber Terrorists
D. Red Hat Hackers
Solution: Cyber Terrorists are very expert programmers and cyber criminals who hide themselves while doing malicious activities over the internet and they are smart enough to hide themselves or their tracks of action. They are hired for gaining unauthorised access to nation’s data centres or break into the network of intelligence agencies.
Q: One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________
A. Sponsored hackers
B. Crackers
C. Hactivist
D. Whistleblowers
Solution: Whistleblowers are those individuals who is a member or an employee of any specific organization and is responsible for disclosing private information of those organizations, firms, either government or private.
Q: These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to?
A. White hat Hackers
B. Elite Hackers
C. Licensed Penetration Testers
D. Red Hat Hackers
Solution: The tag “Elite hackers” are considered amongst the most reputed hackers who possess most of the hacking and security skills. They are treated with utmost respect in the hackers’ community. Zero day vulnerabilities, serious hacking tools and newly introduced bugs are found and developed by them.
Q: _______ are those individuals who maintain and handles IT security in any firm or organization.
A. IT Security Engineer
B. Cyber Security Interns
C. Software Security Specialist
D. Security Auditor
Solution: This is an intermediary level of position of an individual in an organization or firm who builds and preserves different systems and its associated security tools of the firm of organization to which he/she belongs.

You Have Score    /10