Ethical Hacking QUESTION & ANSWERS

Institution University
Course BACHELOR OF COMPUTER...
Year 1st Year
Semester Unknown
Posted By stephen oyake rabilo
File Type pdf
Pages 8 Pages
File Size 70.86 KB
Views 2718
Downloads 0
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

Download questions and answers to the unit Ethical Hacking and be a head of others with elaborative answers . Q1. a) Define the following terms as used in Ethical Hacking (5 Marks) i) Hacking - Hacking refers to the unauthorized access or manipulation of computer systems, networks, or data. ii) Ethical Hacking - Ethical Hacking involves the authorized use of hacking techniques to identify and fix vulnerabilities in systems to prevent unauthorized access or data breaches. iii) Ping Sweep - Ping Sweep is a technique used to identify active devices on a network by sending ICMP echo requests (pings) to a range of IP addresses and waiting for responses. iv) Inverse TCP Flag Scanning - Inverse TCP Flag Scanning is a technique used to identify systems that are not vulnerable to certain types of attacks by exploiting the TCP protocol's behavior.
Below is the document preview.

No preview available
Anatomy of head and neck
The head is the globular cranial end of the body, which contains brain and special sense organs, viz. eyes for vision, ears for hearing and equilibrium, nose for smell, and tongue for taste. It also provides openings for the respiratory and digestive systems. Structurally and developmentally, the head is divided into two parts: cranium and face.
457 Pages 1116 Views 0 Downloads 36.85 MB