Question
a.
Vladimir Levin
b.
Bill Landreth
c.
Richard Stallman
d.
Robert T. Morris
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Who was the first individual to distribute computer worms through internet?
Similar Questions
Discover Related MCQs
Q. _____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
View solution
Q. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________
View solution
Q. Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
View solution
Q. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
View solution
Q. ________ are the combination of both white as well as black hat hackers.
View solution
Q. The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________
View solution
Q. Suicide Hackers are those _________
View solution
Q. Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________
View solution
Q. One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________
View solution
Q. These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to?
View solution
Q. _________ are those individuals who maintain and handles IT security in any firm or organization.
View solution
Q. Role of security auditor is to ____________
View solution
Q. ________ are senior level corporate employees who have the role and responsibilities of creating and designing secured network or security structures.
View solution
Q. From where the term ‘hacker’ first came to existence?
View solution
Q. What is the one thing that old hackers were fond of or find interests in?
View solution
Q. In which year the first popular hacker conference took place?
View solution
Q. What is the name of the first hacker’s conference?
View solution
Q. _______ is the oldest phone hacking techniques used by hackers to make free calls
View solution
Q. __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.
View solution
Q. Governments hired some highly skilled hackers. These types of hackers are termed as _______
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!