1. Right Answer: C
Explanation: White-Box testing requires complete knowledge of a target.
2. Right Answer: D
Explanation: Suicide Hackers are those who aim for destruction without worrying about punishment.
3. Right Answer: B,C
Explanation: Penetration testing is required in an environment to perform an audit, find and exploit vulnerabilities to address them before an attacker reaches them.
4. Right Answer: B
Explanation: Gray Hats are those that are both, offensive and defensive. They are also referred as a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intentions. They perform the task in order to improve the system security.
5. Right Answer: B
Explanation: A vulnerability assessment is a process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.