Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these Answer : b) Weakness...
Cracker is known as a) Black hat b) White hat c) Encrypting d) None of these Answer : a) Black hat...
CEH stands for a) Certified Ethical Hackers b) Cyber Ethical Hackers c) Computer Ethical Hackers d) None of these Answer : a) Certified Ethical Hackers...
Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these Answer : b) White hat hacking...
Most computer crimes are committed by a) Hackers b) Inteenational spies c) Highly paid computer consultants d) Web designers Answer : a) hackers...
50.5k questions
47.1k answers
240 comments
7.0k users