Edu 03:MCQ

      Edu:03 MCQ
        Topic - Hacking

1.Which refers to unauthorized intrusion into a computer or a network? 
    a. Phishing.                b. Hacking 
    c. Spoofing.                d. Cracking 

2. A person who is engaged in hacking activity? 
          a. Hacker.        b. Paedophile 
          c. Stalker.        d. Cracker

3.Name the technique that checks computers on networks for knowing weaknesses?
         a. Virus.            b.Key loggers 
  c.Vulnerability scanner.       d.Trojan

4.Tools designed to record every keystroke on the affected machine for later retrieval? 
       a. Malwere.        b. Key loggers 
       c. Root kit.          d. Backdoor

5. Which hacker do self-replicating programs?
       a. Viruses.       b. Spyware 
       c. Trojan.        d. Malwere 

6.Most popular method of protection against hacking? 
       a. Watchdog.       b. Firewalls
       c. Root kit.          d. Anti-virus 

7.Hacking for a cause is called? 
       a. Activism.              b. Hacktivism
       c. Active hacking    d. Black hat hacking 

8.Name the system designed to prevent unauthorized access from a private network? 
        a. Firewalls.      b. Avg 
        b. Panda.           d. None of the above

9.An adult who is sexually attracted to children? 
        a.Cracker.           b. Hacker 
        c. Facilitator.     d. Paedophile  

10.When IT act 2000 came into effect? 
        a. Oct 17 2000.     b. Oct 17 2001
        c. Nov 11 2000.    d. Dec 12 2001

    
Answers:- 1.b, 2.a, 3.c, 4.b, 5.a, 6.d, 7.b
                    8.a, 9.d, 10.a


Comments

Popular posts from this blog