Is Hacker A Hero or Villain?

advertisement
14 ѧýlÅ
Y. Arunveera Kumar
Subject Expert
IACE, Nellore
Hacker
(Computer security)
Hacker is considered as hero of
computer programs. In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. He is
someone who lives and breathes
computers, who know all about computers, who can get a computer to do
anything. Equally important, though,
is the hacker's attitude. Computer
programming must be a hobby, something done for fun, not out of a sense of duty. Hackers are generally
computer geniuses because it is due
to the extraordinary computer knowledge and skills that they can conveniently break into other computer
systems.
CRACKER
Cracker is considered as villain
of computer programs. A cracker is
someone who breaks into someone
else's computer system, often on a
Oòßæ§ýlÆ>»ê§Šl l VýS$Æý‡$ÐéÆý‡… l
AMøtºÆŠæ l 15 l 2015
Is Hacker A Hero or Villain?
network; bypasses passwords or
licenses in computer programs; or in
other ways intentionally breaches
computer security. A cracker does
this for profit, maliciously, for some
altruistic purpose.
IBPS
CLASSIFICATION OF HACKERS
BASED ON THEIR ATTITUDE:
POs, Clerks
WHITE HAT
A "White hat" hacker breaks
security for non-malicious reasons,
perhaps to test their own security
system or while working for a security company which makes security
software. The term "white hat" in
Internet slang refers to an ethical
hacker.
Special
Computer
Awareness
GREY HAT
A "Black hat" hacker is a hacker
who "violates computer security for
little reason beyond maliciousness or
for personal gain". Black hat hackers
break into secure networks to
destroy, modify, or steal data; or to
make the network unusable for those
who are authorized to use the
A grey hat hacker lies between a
black hat and a white hat hacker.
Grey hat hackers sometimes find
the defect of a system and publish
the facts to the world instead of a
group of people. Even though grey
hat hackers may not necessarily
perform hacking for their personal
gain, unauthorized access to a
system can be considered illegal
and unethical.
3) Compiler
4) All of the above
5) None of these
At a time how many operating
system can be at work on a
computer?
1) Only one
2) Two
3) Three
4) Four
5) None of these
A computer that combines the
characteristic of analog and
digital computers_________
1) Hybrid Computer
2) Analog Computer
3) Digital Computer
4) Super Computer
5) None of these
The technique that extends storage capacities of main memory
beyond the actual size of the
main memory is called _______
1) Multitasking 2) Switching
3) Multiprocessing
4) Multiprogramming
5) Virtual storage
The
maximum
Zoom
percentage in MS WORD
is________
1) 100%
2) 200%
3) 400%
4) 500%
5) None of these
The smallest memory size is?
1) Byte
2) GigaByte
3) KiloByte
4) MegaByte
5) None of these
Android Operating system is an
example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware 5) None of these
Which process checks to ensure
the components of the computer
and operating are connected
properly?
1) Booting
2) Processing
3) Editing
4) Saving
5) None of these
Codes consisting of lines of
varying widths or lengths that are
computer-readable are known as?
1) An ASCII code
2) An OCR scanner
3) A magnetic tape
4) A bar code 5)None of these
What is the ultimate purpose of
Defragmentation?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) None of these
Which input device cannot be
used to work in MS Office?
1) Scanner
2) Mouse
3) Keyboard 4) Joy stick
5) Light pen
Storage that retains its data after
the power is turned off is referred to as?
1) Volatile storage
2) Sequential storage
3) Non-volatile storage
4) Direct storage
5) None of these
Accessing data on tapes is much
______ than that accessing data
on disks?
1) Same
2) Faster
BLACK HAT
MODEL QESTIONS
1. Retail employees typically use
_________ terminals to process
sales transactions.
1) Point of sale
2)Transaction point
3) Automatic teller
4) Sales processing
5) None of these
2. The simultaneous processing of
two or more programs by multiple processors is _____
1) Multiprogramming
2) Multiprocessing
3) Time-sharing
4) Multitasking
5) None of these
3. The ___ folder retains copies of
messages that you have started
but are not yet ready to send.
1) Drafts
2) Sent Items
3)Address Book
4) Outbox
5) None of these
4. Inheritance is the ability of an
object to pass on its characteristics to its ________.
1) Subclasses
2)off-spring
3) Super classes 4) Parents
5) None of these
5. Which of the following is used
for close a tab on a browser?
1) Ctrl + T
2) Ctrl + Y
3) Ctrl + A
4) Ctrl + W
5) None of these
6. A program that converts high
level language to machine
Language is _______
1) Linker
2) Assembler
network. Black hat hackers are also
referred to as the "crackers" within
the security industry and by modern
programmers.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
ELITE HACKER
A social status among hackers,
elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers.
SCRIPT KIDDIE
A script kiddie (also known as a
skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written
by others.
NEOPHYTE
A neophyte ("newbie", or
"noob") is someone who is new to
hacking or phreaking and has almost
no knowledge or experience of the
workings of technology and hacking.
BLUE HAT
A blue hat hacker is someone
outside computer security consulting
firms who is used to bug-test a system prior to its launch, looking for
exploits so they can be closed.
PHREAKS
A phreak is a hacker who spec3) Slower
4) All of the above
5) None of these
19. IP-Address 192.5.48.3 belongs to1) Class A
2) Class B
(3) Class C
4) Class D
5) None of these
20. Which type of web document is
run at the client site?
1) Static
2) Dynamic
3) Active
4) All of the above
5) None of these
21. UDP (User Diagram Protocol)
is1) Connectionless
2) Network Oriented
3) Connection oriented
4) a & b
5) None of these
22. Which of the following is NOT
a Microsoft Internet tool or
ializes in phone systems. These days,
however, phreaking is more of a cracker activity. At one time, phreaks
were enthusiastic about telephone networks and simply wanted to understand how they worked and explore them. Ethical phreaks didn’t steal services or cause damage; they just used their technical skill to play with the system. Phone systems have changed and are less susceptible to technological
hacks. As a result, modern phreaks
intent on cracking the telecommunications systems often rely on criminal
acts such as stealing phone cards and
cloning cell phones.
HACKTIVISTS
The hacktivist is a gray hat or
cracker who defaces Web pages to
bring attention to a political agenda
or social cause. Companies, organizations, and governments that engage in controversial practices or that
have unpopular policies are likely
targets of hacktivists. How ethical
this behaviour is depends on whether
or not you support the hactivist’s
agenda or believe in his cause.
technology?
1) Dreamweaver
2) Silver light
3) Internet Explorer
4) Expression Web
5) None of these
23. Which Software protects the
resources of a private network
from
users
from
other
networks?
1) Cache server 2) proxy server
3) Firewall
4) Router
5) None of these
KEY
1) 1;
5) 4;
9) 5;
13) 1;
17.3;
21.1;
2) 2;
6) 3;
10) 4;
15) 2;
18) 3;
22) 1;
3) 1;
7) 1;
11) 3;
14) 4;
19) 3;
23) 3.
4) 1;
8) 1;
12) 1;
16) 4;
20) 1;
www.sakshieducation.com
S Online Grand Tests
S
C
4 Tests
’
C
only
H
S
L Free Study Material
100
SAKSHI EDUCATION
Download