>
Exams
>
Informatics Practices
>
Network Security
>
when a hacker uses knowledge to find and help in f
Question:
When a hacker uses knowledge to find and help in fixing the security flaws in the system is called -
CUET (UG) - 2023
CUET (UG)
Updated On:
Sep 23, 2024
Unethical Hacking
Ethical Hacking
Black Hat Hacking
Grey Hat Hacking
Hide Solution
Verified By Collegedunia
The Correct Option is
B
Solution and Explanation
The correct option is (B) :Ethical Hacking.
Download Solution in PDF
Was this answer helpful?
0
0
Top Questions on Network Security
The process of secret capture and analysis of network traffic by malicious users is called:
CUET (UG) - 2023
Computer Science
Network Security
View Solution
Which of the following is/are false ?
(A) Computer viruses are healthy codes written to test the security health of a system
(B) A worm is self replication of a program
(C) Trojan horse is a utility program that does harm when its date is expired
(D) Spyware is a healthy software which keeps an eye on activities happening on your computer
Choose the correct answer from the options given below :
CUET (UG) - 2023
Computer Science
Network Security
View Solution
Methods of Malware identification used by Antivirus is?
CUET (UG) - 2023
Informatics Practices
Network Security
View Solution
View All
Questions Asked in CUET exam
A person walks 10 m North, then turns right and walks 5 m, then turns right again and walks 10 m. What direction is he facing now?
CUET (UG) - 2025
Direction sense
View Solution
Pointing to a man, Rani says, "He is the son of my mother's only daughter.” How is the man related to Rani?
CUET (UG) - 2025
Blood Relations
View Solution
What is the angle between the hour and minute hand at 3:30?
CUET (UG) - 2025
Clock and Calendar
View Solution
Rearrange the parts to form a logical sentence:
A) the city's new policy
B) has significantly improved
C) air quality
D) over the past year
CUET (UG) - 2025
Sentence Arrangement
View Solution
A person who treats sick animals is called a:
CUET (UG) - 2025
Vocabulary
View Solution
View More Questions