Ethical Hacking QUESTION & ANSWERS
| Institution | University |
| Course | BACHELOR OF COMPUTER... |
| Year | 1st Year |
| Semester | Unknown |
| Posted By | stephen oyake rabilo |
| File Type | |
| Pages | 8 Pages |
| File Size | 70.86 KB |
| Views | 2718 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
Download questions and answers to the unit Ethical Hacking and be a head of others with elaborative answers .
Q1. a) Define the following terms as used in Ethical Hacking (5 Marks)
i) Hacking
- Hacking refers to the unauthorized access or manipulation of computer systems, networks,
or data.
ii) Ethical Hacking
- Ethical Hacking involves the authorized use of hacking techniques to identify and fix
vulnerabilities in systems to prevent unauthorized access or data breaches.
iii) Ping Sweep
- Ping Sweep is a technique used to identify active devices on a network by sending ICMP
echo requests (pings) to a range of IP addresses and waiting for responses.
iv) Inverse TCP Flag Scanning
- Inverse TCP Flag Scanning is a technique used to identify systems that are not vulnerable to
certain types of attacks by exploiting the TCP protocol's behavior.
Below is the document preview.
Anatomy of head and neck
The head is the globular cranial end of the body, which contains brain and special sense organs, viz. eyes for vision, ears for hearing and equilibrium, nose for smell, and tongue for taste. It also provides openings for the respiratory and digestive systems. Structurally and developmentally, the head is divided into two parts: cranium and face.
457 Pages
1116 Views
0 Downloads
36.85 MB