Computer Quiz – 85

COMPUTER QUIZ ON NETWORKING

1. Packet Sniffer is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

Click here to View Answer
Answer a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

2. Rootkit is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

Click here to View Answer
Answer b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

3. Spoofing attack is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

Click here to View Answer
Answer c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

4. Security exploit is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Click here to View Answer
Answer a) a prepared application that takes advantage of a known weakness.

5. A spoofing attack is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby
gaining illegitimate access.

Click here to View Answer
Answer d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby
gaining illegitimate access.

6. White hat is
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
d) None of these

Click here to View Answer
Answer a) hacker breaks security for altruistic or at least non-malicious reasons.

7. Grey hat is
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
d) None of these

Click here to View Answer
Answer b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

8. Blue hat is
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
d) None of these

Click here to View Answer
Answer c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

9. Black hat is
a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
c) hacker who utilizes technology to announce a political message.
d) None of these

Click here to View Answer
Answer a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.

10. Script kiddie is
a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
c) hacker who utilizes technology to announce a political message.
d) None of these

Click here to View Answer
Answer b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.

Check out our latest videos on youtube