• 1. 
    What type of ethical hack tests access to the physical infrastructure?

  • Internal network
  • Remote network
  • External network
  • Physical access
  • 2. 
    MAC address spoofing is which type of attack?

  • Encryption
  • Brute-force
  • Authentication
  • Social engineering
  • 3. 
    What is the first phase of hacking?

  • Attack
  • Maintaining access
  • Gaining access
  • Reconnaissance
  • 4. 
    Hacking for a cause is called:

  • Active hacking
  • Hacktivism
  • Activism
  • Black-hat hacking
  • 5. 
    Malware Is Illegal

  • True
  • False
  • I Don't Know
  • :(
  • 6. 
    Name the attack type when a hacker attempts to attack a host via the Internet.

  • Remote attack
  • Physical access
  • Local access
  • Internal attack
  • 7. 
    Which is the most appropriate definition of a hacker?

  • Is someone who gains unauthorised access to an IT system such as a computer, website or email account.
  • Someone who accesses your home without your permission.
  • 8. 
    What is the difference between a virus and a worm?

  • A virus needs human intervention, a worm doesn't
  • A virus deletes files, whereas a worm doesn't.
  • 9. 
    What is adware?

  • Causes adverts to appear
  • Deletes files
  • 10. 
    How can you protect your computer against viruses?

  • Put a lock on it.
  • Install an anti-virus package, scan and delete files and update it.
  • 11. 
    Are there more than 2 types of hackers?

  • Yes
  • No
  • 12. 
    What are good hackers also known as? (check all that apply)

  • White hat hackers
  • Security hackers
  • A+ hackers
  • Both A & B
  • 13. 
    How does a worm infect a computer?

  • E-mail attachments
  • Through security loopholes, your computer is not up to date
  • Suspicious web links
  • On memory sticks
  • 14. 
    What are bad hackers also known as? (check all that apply)

  • Cracker hackers
  • Black hat hackers
  • Cookie hackers
  • Both A & B
  • 15. 
    What can a virus do to your computer?

  • Delete files
  • Cause inappropriate adverts to appear
  • Spy on what you are doing
  • Steal your infotrmation
  • 16. 
    How does a computer virus infect a pc?

  • Email attachments
  • Attached to files on memory sticks
  • Suspicious web links
  • All of the above
  • 17. 
    How is adware malicious?

  • Deletes files.
  • Inappropriate and wastes your time/
  • Slows your pc down.
  • Spies on you, collecting your information
Report Question
warning
access_time
  Time