in Education by
________ are the combination of both white as well as black hat hackers. (a) Grey Hat hackers (b) Green Hat hackers (c) Blue Hat Hackers (d) Red Hat Hackers This question was posed to me during an online interview. I want to ask this question from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right choice is (a) Grey Hat hackers Explanation: Grey Hat Hackers have a blending character of both ethical as well as un-ethical hacker. They hack other’s systems for fun but do not harm the system, exploits bugs and vulnerabilities in network without the knowledge of the admin or the owner.

Related questions

0 votes
    Governments hired some highly skilled hackers. These types of hackers are termed as _______ (a) Special Hackers (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    In _____________________ same keys are implemented for encrypting as well as decrypting the information. (a) ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Suicide Hackers are those _________ (a) who break a system for some specific purpose with or without keeping in mind ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    ________________ are piece of programs or scripts that allow hackers to take control over any system. (a) Exploits (b ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    __________________is a computing action used in which usernames & info about user-groups, shares as well as services of ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures. (a) True (b ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    __________ is a popular tool used for discovering networks as well as in security auditing. (a) Ettercap (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...