Ethical Hacking MCQs [1]

1) For which of the following, the tester is provided only with partial information about a network? a. White box modelb. Black box modelc. Gray box modeld. None of these Answer: c Solution: In the white box model, the tester has complete information about the network. In the black box model, the tester does not... Continue Reading →


A plaintext message may be hidden in one of two ways. The methods of steganography conceal the existence of the message, whereas the methods of cryptography render the message unintelligible to outsiders by various transformations of the text. Steganography was an obsolete word that was revived by David Kahn and given the meaning it has... Continue Reading →

Computer Security

The NIST Computer Security Handbook [NIST95] defines the term computer security as follows: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Photo by George Becker on This definition introduces... Continue Reading →

Up ↑