1.Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.?





2.has now evolved to be one of the most popular automated tools for unethical hacking. ?





3.Leaking your company data to the outside network without prior permission of senior authority is a crime.?




4.is the technique used in business organizations and firms to protect IT assets ?





5.The legal risks of ethical hacking include lawsuits due to __________ of personal data ?





6.Before performing any penetration test, through legal procedure, which key points listed below is not mandatory.?





7.After performing ____________ the ethical hacker should never disclose client information to other parties.?





8.helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.?





9.A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures ?





10.is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.?






11.Which of these is not a step followed by cyber-criminals in data breaching.?





12.What types of data are stolen by cyber-criminals in most of the cases ?





13.You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________ ?






14.Which of the companies and organizations do not become the major targets of attackers for data stealing ?





15.An attacker, who is an employee of your firm may ___________ to know your system password ?