1.Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.?
2.has now evolved to be one of the most popular automated tools for unethical hacking. ?
3.Leaking your company data to the outside network without prior permission of senior authority is a crime.?
4.is the technique used in business organizations and firms to protect IT assets ?
5.The legal risks of ethical hacking include lawsuits due to __________ of personal data ?
6.Before performing any penetration test, through legal procedure, which key points listed below is not mandatory.?
7.After performing ____________ the ethical hacker should never disclose client information to other parties.?
8.helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.?
9.A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures ?
10.is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.?
11.Which of these is not a step followed by cyber-criminals in data breaching.?
12.What types of data are stolen by cyber-criminals in most of the cases ?
13.You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________ ?
14.Which of the companies and organizations do not become the major targets of attackers for data stealing ?
15.An attacker, who is an employee of your firm may ___________ to know your system password ?