1.
Ethical Hacking
___________ is the process of discovering a route from source to destination.
2.
Ethical Hacking
How many bits are used by IPv6?
3.
Ethical Hacking
Banner grabbing is an example of what?
4.
Ethical Hacking
What has now evolved to be one of the most popular automated tools for unethical hacking.
5.
Ethical Hacking
What are the forms of password cracking techniques?
6.
Ethical Hacking
Which Malware apears to perform user required functions, but internally performs undisclosed attack such as unauthorized access to the attacker’s pc?
7.
Ethical Hacking
When a hacker attempts to attack a host via the internet it is known as what type of attack?
8.
Ethical Hacking
A packet with all flags set is which type of scan?
9.
Ethical Hacking
Hacking for a cause is called
10.
Ethical Hacking
Which are the four regional Internet registries?
11.
Ethical Hacking
What is the main characteristic of POLYMORPHIC virus?
12.
Ethical Hacking
What does the TCP RST command do?
13.
Ethical Hacking
What is the attack called "Evil Twin"?
14.
Ethical Hacking
What is the port number for HTTP Protocol?
15.
Ethical Hacking
What is the main function of SPYWARE?
16.
Ethical Hacking
What is the first phase of hacking?
17.
Ethical Hacking
What is the primary goal of an Ethical Hacker?
18.
Ethical Hacking
Which port number is used by telnet?
19.
Ethical Hacking
____ is the art of exploiting the human elements to gain access to unauthorized resources.
20.
Ethical Hacking
SHA-512 encryption uses ____ bit words.