Contents

Which of the following is designed to bypass all security systems?
a) scavenging                      
b) trap door
c) data diddling   
d) zapping


d

The process of exchanging data before or as it enters the system is called…….
a) scavenging                      
b) trap door
c) data diddling  
d) zapping


c

Which of the following factors are responsible for disaster of security violations?
a) loss of hardware             
b) loss of software
c) loss of data                      
d) all of these


d

How many types of hackers?
a) one    
b) two    
c) three 
d) four

c

white-hat hacker, black-hat hacker, grey-hat hacker



A type of hackers who are paid by company to break into company’ computer system to find security is called
a) white-hat hackers 
b) ethical hackers
c) black-hat hackers            
d) both a & b


d

Which of the following problems caused by hackers?
a) information of client
b) credit card detail
c) passwords                        
d) all of these


d