1.
What type of Hacker are you ? if you are taking buildup by demonstrating some other developed simple hacking techniques
Correct Answer
B. Script Kiddes
Explanation
The correct answer is "Script Kiddes" because script kiddies are individuals who use pre-existing hacking tools and scripts to carry out attacks without having a deep understanding of how they work. They rely on the work of others to exploit vulnerabilities and often lack the skills to develop their own hacking techniques. This aligns with the scenario described in the question where someone is demonstrating simple hacking techniques that they have not personally developed.
2.
Which of the following is not a actual hacker terminology ? Select which ever applicable
Correct Answer(s)
B. Orange Hat Hacker
D. Pink Hat Hacker
Explanation
The term "Orange Hat Hacker" is not an actual hacker terminology. The correct terminologies used in the hacking community are Green Hat Hacker, Black Hat Hacker, and Pink Hat Hacker. The term "Orange Hat Hacker" does not exist in the context of hacking.
3.
Suppose you want to learn some hacking skills for good purpose and you start learning by demonstrating hacking techniques which is developed others. Who are you ?
Correct Answer
A. Green Hat Hacker
4.
What Vulnerabilities that the Black hat hackers will find ? Select all applicable
Correct Answer(s)
B. Individual PC
C. Bank Systems
D. Organizations
Explanation
Black hat hackers are individuals who engage in illegal activities and exploit vulnerabilities in computer systems for personal gain. They typically target individual PCs, bank systems, and organizations because these entities possess valuable information and resources that can be exploited. By compromising individual PCs, hackers can gain access to personal data and sensitive information. Similarly, infiltrating bank systems allows hackers to steal financial information and carry out fraudulent activities. Organizations are targeted for their valuable data, intellectual property, and financial resources. Therefore, black hat hackers will find vulnerabilities in individual PCs, bank systems, and organizations.
5.
Whom among the following hackers are permitted to Hack legally
Correct Answer
C. White Hat Hacker
Explanation
White Hat Hackers are permitted to hack legally. They are ethical hackers who use their skills to identify and fix vulnerabilities in computer systems and networks. They work with the permission of the system owners to ensure the security of the systems. Unlike Black Hat Hackers who engage in illegal activities for personal gain, White Hat Hackers work to protect and secure systems. Green Hat Hackers are typically beginners or novice hackers, while Grey Hat Hackers may engage in hacking activities without authorization but with good intentions.
6.
Whether hacking is Ethical given good intentions but no permission?
Correct Answer
B. False
Explanation
Hacking without permission is considered unethical, regardless of the intentions behind it. Even if the intentions are good, unauthorized access to someone's computer or network is a violation of their privacy and can cause harm. Ethical hacking, also known as penetration testing, is conducted with the explicit permission of the owner to identify vulnerabilities and improve security.
7.
Whether hacking is Ethical given good intentions and permission?
Correct Answer
A. True
Explanation
The given answer suggests that hacking can be ethical if it is done with good intentions and permission. This implies that if someone hacks into a system or network with the intention of finding vulnerabilities and improving security, and they have obtained proper authorization to do so, then it can be considered ethical. Ethical hacking, also known as "white hat" hacking, is a practice employed by organizations to identify and fix security weaknesses.
8.
Which of the following was Top Security Breaches resulted in huge loss (Select all Applicable)
Correct Answer(s)
A. Yahoo
B. Wanna Cry
Explanation
The correct answer is Yahoo and Wanna Cry. Both Yahoo and Wanna Cry were major security breaches that resulted in significant losses. Yahoo experienced multiple data breaches between 2013 and 2016, compromising the personal information of billions of users. Wanna Cry, on the other hand, was a global ransomware attack in 2017 that infected hundreds of thousands of computers worldwide, causing extensive damage and financial losses.
9.
Whether Computer Virus can help Hackers?
Correct Answer
A. Yes
Explanation
Computer viruses can indeed help hackers in their malicious activities. A computer virus is a type of malicious software that can replicate itself and spread from one computer to another. Once a computer is infected with a virus, it can be controlled remotely by the hacker, allowing them to gain unauthorized access to sensitive information, disrupt computer systems, or launch further cyber attacks. Therefore, computer viruses can be a powerful tool in the hands of hackers to achieve their objectives.