ExamCompetition Forum Question Papers Ask A Question Mock Test Learn & Earn Sign Up Login Menu



0 vote

Read the passage and answer the following questions. The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud computing, virtualization, or IT outsourcing, enterprises are facing&nbs

Asked on by | Votes 0 | Views: 13 | Tags: reading comprehension     | english comprehension     | Add Bounty

Read the passage and answer the following questions.

The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud computing, virtualization, or IT outsourcing, enterprises are facing imminent security threats and must adjust their security processes, policies, and architectures accordingly. Among the many options available to help customers to achieve this goal, organizations should consider the value of ethical hacking services, which are rapidly gaining attention as an essential security practice that should be performed on a regular basis.“The elevated threat landscape therefore, urgently dictates the need for a comprehensive, real-world assessment of an organization’s security posture. This assessment is a first vital step to enact effective security policies, procedures, and infrastructure that will prevent or mitigate the effects of a data breach.” Ethical hacking offers an objective analysis of an organization’s information security posture for organizations of any level of security expertise. The ethical hacking organization has no knowledge of the company’s systems other than what they can gather. Hackers must scan for weaknesses, test entry points, priorities targets, and develop a strategy that best leverages their resources. The objectiveness of this kind of security assessment has a direct impact on the value of the whole evaluation. However, businesses still remain skeptical about the risk inherent with inviting a third-party to attempt to access sensitive systems and resources.To reduce this fear, businesses should hire only ethical hacking companies that implement practices to ensure privacy and confidentiality. They should also be accredited by international trade organizations such as the EC-Council and ISC. Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security and to minimize or eliminate any potential attacks. The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals or cyber criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker, or CEHIn a search for ways to reduce the fear and worry of being hacked, organizations have come to the realization that an effective way to evaluate security threats is to have independent security exerts attempt to hack into their computer systems. In the case of computer security, these tiger teams or ethical hackers would use the same tools and techniques as an attacker, but rather than damage the system or steal information, they would evaluate the system security and report the vulnerabilities they found and provide instructions for how to remedy them. From the early days of computers, ethical hacking has been used as an evaluation of system security. Many early ethical hacks were conducted by the United States Military to carry out security evaluations on their operating systems to determine whether they should employ a two-level (secret/top secret) classification system. However, with the growth of computing and networking in the early 1990's, computer and network vulnerability studies began to appear outside of the military organization. In December of 1993, two computer security researchers, Dan Farmer from Elemental Security and Wietse Venema from IBM, suggested that the techniques used by hackers can be used to assess the security of an information system. They wrote a report that was shared publicly on the Internet which described how they were able to gather enough information to compromise security and they provided several examples of how this information could be gathered and exploited to gain control of a system, and how such an attack could be prevented. An ethical hacker should set simple goals, such as finding unauthorized wireless access points or obtaining information from a wired network system. In any case, the goals should be articulate and well communicated. Written permission is required and should state that an ethical hacker is authorized to perform a test according to the plan. It should also say that the organization will provide legal and organizational support in case criminally charges or lawsuits arise. This is conditional on staying within the bounds of the approved plan. An ethical hacker is bound to confidentiality and non-disclosure of information they may uncover. Ethical hackers must also be compliant with their organization's governance and local laws. An ethical hack must not be performed when the company policy or the law for that matter, explicitly forbids it.


Which of the following can be inferred to be a major reason of increasing the problem of hacking?
1). Lack of ethics among people
2). Increased technology
3). Lack of proper laws in the country
4). Excessive unauthorized access of some web pages


Share on Facebook      Share on Whatsapp       Share on Twitter




1 answers

3 vote
Answered by on | Votes 3 |
With the advent and progress of technology the problem of hacking too increased. Thus the major reason that contributed to the problem of hacking is technology. Option 2 is the correct answer.

Join Telegram Group




Answer This Question

Name:
Email:
Answer :
Sum of (1+2)
Submit:

Other Questions

1. A sentence with a highlighted word is given below. Some alternatives are given as options which may be used to improve the sentence by replacing the word in bold. You may choose option 1, 2,or 3. In case no improvement is needed, choose 4. A ‘bill of exchange’ contains a state date of payment that must be concluded on that date irrespective of any disputes.

2. In the following question, two columns are given containing three phrases each. In the first column, the phrases are A, B and C, and in the second column, the phrases are D, E and F. A phrase from the first column, may or may not connect with a phrase from the second column to make a grammatically a

3. Which of the following phrases (I), (II), and (III) given below each sentence should replace the phrase printed in bold letters to make the sentence grammatically correct? Choose the best option among the five given alternatives that reflect the correct use of phrase in the context of the grammatically correct sentence. If the sentence is correct as it is, mark (e) i.e., ?No correction required? as the answer.

4. Read the sentence to find out whether there is any error in it or not. The error, if any, will be in TWO parts of the sentence. The number of that part is the answer. If there is no error, the answer is (5). Ignore errors of punctuation, if any.   The new dads decided in raise their twins (A) with utmost care and hoping (B) to shape them up as (C) concerned, aware and strong individuals (D).

5. What is the antonym or opposite of word STURDY

6. Read the passage to answer the following questions. Corruption in the Indian society has prevailed from time immemorial in one form or the other. The basic inception of corruption started with our opportunistic leaders who have already done greater damage to our nation. People who work on right pri

7. In the following question, the sentence given with blank to be filled in with an appropriate word. Select the correct alternative out of the four and indicate it by selecting the appropriate option.I ________ to return by the 3rd of the month.

8. Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in bold to help you locate them while answering some of the questions. The past quarter of a century has seen several bursts of selling by the world?s governments, mostly but not alw

9. Read this sentence to find out whether there is any grammatical error in it. The error, if any, will be one part of the sentence. Mark the part with the error as your answer. If there is no error, mark 'No error' as your answer. (Ignore the errors of punctuation, if any)

10. What is the antonym or opposite of word MIGRATE