Which of the following is designed to bypass all security systems?
a) scavenging
b) trap door
c) data diddling
d) zapping
The process of exchanging data before or as it enters the system is called…….
a) scavenging
b) trap door
c) data diddling
d) zapping
Which of the following factors are responsible for disaster of security violations?
a) loss of hardware
b) loss of software
c) loss of data
d) all of these
How many types of hackers?
a) one
b) two
c) three
d) four
white-hat hacker, black-hat hacker, grey-hat hacker
A type of hackers who are paid by company to break into company’ computer system to find security is called
a) white-hat hackers
b) ethical hackers
c) black-hat hackers
d) both a & b
Which of the following problems caused by hackers?
a) information of client
b) credit card detail
c) passwords
d) all of these