14 ѧýlÅ Y. Arunveera Kumar Subject Expert IACE, Nellore Hacker (Computer security) Hacker is considered as hero of computer programs. In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. He is someone who lives and breathes computers, who know all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty. Hackers are generally computer geniuses because it is due to the extraordinary computer knowledge and skills that they can conveniently break into other computer systems. CRACKER Cracker is considered as villain of computer programs. A cracker is someone who breaks into someone else's computer system, often on a Oòßæ§ýlÆ>»ê§Šl l VýS$Æý‡$ÐéÆý‡… l AMøtºÆŠæ l 15 l 2015 Is Hacker A Hero or Villain? network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker does this for profit, maliciously, for some altruistic purpose. IBPS CLASSIFICATION OF HACKERS BASED ON THEIR ATTITUDE: POs, Clerks WHITE HAT A "White hat" hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. Special Computer Awareness GREY HAT A "Black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the A grey hat hacker lies between a black hat and a white hat hacker. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical. 3) Compiler 4) All of the above 5) None of these At a time how many operating system can be at work on a computer? 1) Only one 2) Two 3) Three 4) Four 5) None of these A computer that combines the characteristic of analog and digital computers_________ 1) Hybrid Computer 2) Analog Computer 3) Digital Computer 4) Super Computer 5) None of these The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _______ 1) Multitasking 2) Switching 3) Multiprocessing 4) Multiprogramming 5) Virtual storage The maximum Zoom percentage in MS WORD is________ 1) 100% 2) 200% 3) 400% 4) 500% 5) None of these The smallest memory size is? 1) Byte 2) GigaByte 3) KiloByte 4) MegaByte 5) None of these Android Operating system is an example of which kind of Source Model? 1) Open Source 2) Vertical Market Software 3) Horizontal Market Software 4) Shareware 5) None of these Which process checks to ensure the components of the computer and operating are connected properly? 1) Booting 2) Processing 3) Editing 4) Saving 5) None of these Codes consisting of lines of varying widths or lengths that are computer-readable are known as? 1) An ASCII code 2) An OCR scanner 3) A magnetic tape 4) A bar code 5)None of these What is the ultimate purpose of Defragmentation? 1) Make the PC faster 2) Create More Free Space 3) Delete temporary files 4) Reduce Power consumption 5) None of these Which input device cannot be used to work in MS Office? 1) Scanner 2) Mouse 3) Keyboard 4) Joy stick 5) Light pen Storage that retains its data after the power is turned off is referred to as? 1) Volatile storage 2) Sequential storage 3) Non-volatile storage 4) Direct storage 5) None of these Accessing data on tapes is much ______ than that accessing data on disks? 1) Same 2) Faster BLACK HAT MODEL QESTIONS 1. Retail employees typically use _________ terminals to process sales transactions. 1) Point of sale 2)Transaction point 3) Automatic teller 4) Sales processing 5) None of these 2. The simultaneous processing of two or more programs by multiple processors is _____ 1) Multiprogramming 2) Multiprocessing 3) Time-sharing 4) Multitasking 5) None of these 3. The ___ folder retains copies of messages that you have started but are not yet ready to send. 1) Drafts 2) Sent Items 3)Address Book 4) Outbox 5) None of these 4. Inheritance is the ability of an object to pass on its characteristics to its ________. 1) Subclasses 2)off-spring 3) Super classes 4) Parents 5) None of these 5. Which of the following is used for close a tab on a browser? 1) Ctrl + T 2) Ctrl + Y 3) Ctrl + A 4) Ctrl + W 5) None of these 6. A program that converts high level language to machine Language is _______ 1) Linker 2) Assembler network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. ELITE HACKER A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. SCRIPT KIDDIE A script kiddie (also known as a skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written by others. NEOPHYTE A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. BLUE HAT A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. PHREAKS A phreak is a hacker who spec3) Slower 4) All of the above 5) None of these 19. IP-Address 192.5.48.3 belongs to1) Class A 2) Class B (3) Class C 4) Class D 5) None of these 20. Which type of web document is run at the client site? 1) Static 2) Dynamic 3) Active 4) All of the above 5) None of these 21. UDP (User Diagram Protocol) is1) Connectionless 2) Network Oriented 3) Connection oriented 4) a & b 5) None of these 22. Which of the following is NOT a Microsoft Internet tool or ializes in phone systems. These days, however, phreaking is more of a cracker activity. At one time, phreaks were enthusiastic about telephone networks and simply wanted to understand how they worked and explore them. Ethical phreaks didn’t steal services or cause damage; they just used their technical skill to play with the system. Phone systems have changed and are less susceptible to technological hacks. As a result, modern phreaks intent on cracking the telecommunications systems often rely on criminal acts such as stealing phone cards and cloning cell phones. HACKTIVISTS The hacktivist is a gray hat or cracker who defaces Web pages to bring attention to a political agenda or social cause. Companies, organizations, and governments that engage in controversial practices or that have unpopular policies are likely targets of hacktivists. How ethical this behaviour is depends on whether or not you support the hactivist’s agenda or believe in his cause. technology? 1) Dreamweaver 2) Silver light 3) Internet Explorer 4) Expression Web 5) None of these 23. Which Software protects the resources of a private network from users from other networks? 1) Cache server 2) proxy server 3) Firewall 4) Router 5) None of these KEY 1) 1; 5) 4; 9) 5; 13) 1; 17.3; 21.1; 2) 2; 6) 3; 10) 4; 15) 2; 18) 3; 22) 1; 3) 1; 7) 1; 11) 3; 14) 4; 19) 3; 23) 3. 4) 1; 8) 1; 12) 1; 16) 4; 20) 1; www.sakshieducation.com S Online Grand Tests S C 4 Tests ’ C only H S L Free Study Material 100 SAKSHI EDUCATION