Ethical Hacking QUESTION & ANSWERS
| Institution | University |
| Course | BACHELOR OF COMPUTER... |
| Year | 1st Year |
| Semester | Unknown |
| Posted By | stephen oyake rabilo |
| File Type | |
| Pages | 8 Pages |
| File Size | 70.86 KB |
| Views | 1482 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
Download questions and answers to the unit Ethical Hacking and be a head of others with elaborative answers .
Q1. a) Define the following terms as used in Ethical Hacking (5 Marks)
i) Hacking
- Hacking refers to the unauthorized access or manipulation of computer systems, networks,
or data.
ii) Ethical Hacking
- Ethical Hacking involves the authorized use of hacking techniques to identify and fix
vulnerabilities in systems to prevent unauthorized access or data breaches.
iii) Ping Sweep
- Ping Sweep is a technique used to identify active devices on a network by sending ICMP
echo requests (pings) to a range of IP addresses and waiting for responses.
iv) Inverse TCP Flag Scanning
- Inverse TCP Flag Scanning is a technique used to identify systems that are not vulnerable to
certain types of attacks by exploiting the TCP protocol's behavior.
Below is the document preview.
ORIENTATION, TRAINING AND DEVELOPMENT
Importance of Employee Orientation Programs
Reduce newcomer stress and anxiety - fear
of failure on the job. It is a normal fear of the
unknown, focused on the ability to do the job
Reduce start-up costs
Expedite proficiency/Skills/abilities
Assist in newcomer assimilation
Enhance adjustment to work group and norms
54 Pages
315 Views
0 Downloads
281.18 KB