Ethical Hacking QUESTION & ANSWERS

Institution University
Course BACHELOR OF COMPUTER...
Year 1st Year
Semester Unknown
Posted By stephen oyake rabilo
File Type pdf
Pages 8 Pages
File Size 70.86 KB
Views 1495
Downloads 0
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

Download questions and answers to the unit Ethical Hacking and be a head of others with elaborative answers . Q1. a) Define the following terms as used in Ethical Hacking (5 Marks) i) Hacking - Hacking refers to the unauthorized access or manipulation of computer systems, networks, or data. ii) Ethical Hacking - Ethical Hacking involves the authorized use of hacking techniques to identify and fix vulnerabilities in systems to prevent unauthorized access or data breaches. iii) Ping Sweep - Ping Sweep is a technique used to identify active devices on a network by sending ICMP echo requests (pings) to a range of IP addresses and waiting for responses. iv) Inverse TCP Flag Scanning - Inverse TCP Flag Scanning is a technique used to identify systems that are not vulnerable to certain types of attacks by exploiting the TCP protocol's behavior.
Below is the document preview.

No preview available
ORIENTATION, TRAINING AND DEVELOPMENT
Importance of Employee Orientation Programs Reduce newcomer stress and anxiety - fear of failure on the job. It is a normal fear of the unknown, focused on the ability to do the job Reduce start-up costs Expedite proficiency/Skills/abilities Assist in newcomer assimilation Enhance adjustment to work group and norms
54 Pages 322 Views 0 Downloads 281.18 KB