Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
32 views3 pages

3wb ETI

The document describes an ethics in technology course workbook covering topics like wireless hacking tools, wireless encryption vulnerabilities, types of hackers, phases of hacking, and laws used to prosecute hackers. It provides questions and answers on topics like passive wireless discovery tools, weaknesses of WEP encryption, the role of white hat hackers, types of ethical hacking tests, and risks posed by different types of hackers.

Uploaded by

snehadhavale08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views3 pages

3wb ETI

The document describes an ethics in technology course workbook covering topics like wireless hacking tools, wireless encryption vulnerabilities, types of hackers, phases of hacking, and laws used to prosecute hackers. It provides questions and answers on topics like passive wireless discovery tools, weaknesses of WEP encryption, the role of white hat hackers, types of ethical hacking tests, and risks posed by different types of hackers.

Uploaded by

snehadhavale08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

JSPM’s

RAJARSHI SHAHU COLLEGE OF ENGINEERING,


POLYTECHNIC

Department of Computer Engineering


Academic Year 2023-24

Workbook-5

Course: ETI Course Code: 22618


Course & Code: CO6I Class: TYCO
Semester: Sixth Name of the Faculty: Mrs.S.P.Sabat
Date:

CO 5:Describe Ethical Hacking process.

CHAPTER 5: Basics of Hacking

1.Which of the following is a passive wireless discovery tool?


a NetStumbler
b
Aircrack

c Kismet
d Netsniff
Answer:

2. Which of the following is true regarding WEP cracking?


a Initialization vectors are small, get reused frequently, and are sent in cleartext
b Initialization vectors are small, get reused frequently, but are encrypted during transmission
c
Initialization vectors are large, get reused frequently, and are sent in cleartext

d Initialization vectors are large, get reused frequently, but are encrypted during transmission
Answer:

3.Which of the following statements best describes a white-hat hacker?

a Security professional
b Former black hat
c Former grey hat
d Malicious hacker
Answer:

4.A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
a Grey-box testing
b Black-box testing
c White-box testing
d Active testing
Answer:

5.What is the first phase of hacking?


a Attack
b Maintaining access
c Gaining access
d Reconnaissance
Answer:

6.What type of ethical hack tests access to the physical infrastructure?

a Internal network
b Remote network
c External network
d Physical access
Answer:

7.The security, functionality, and ease of use triangle illustrates which concept?

a As security increases, functionality and ease of use increase.


b As security decreases, functionality and ease of use increase.
c As security decreases, functionality and ease of use decrease.
d Security does not affect functionality and ease of use.
Answer:

8.Which type of hacker represents the highest risk to your network?

a Disgruntled employees
b Black-hat hackers
c Grey-hat hackers
d Script kiddies
Answer:

9.Hacking for a cause is called __________________.


a Active hacking
b Hacktivism
c Activism
d Black-hat hacking
Answer:

10. Which federal law is most commonly used to prosecute hackers?


a Title 12
b Title 18
c Title 20
d Title 2
Answer:

Course Teacher HOD

You might also like