Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.
Which of the following is NOT true for Bootstrap program? …
The correct option is (D) Performs user management.
The correct option is (D) Performs user management.
See lessInternshala ethical hacking final test answers: Question sequence differs but …
Internshala ethical hacking final test answers: 1.Lease time is used in which protocol? ANSWER: DHCP 2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching): Entry will be checked in the hosts file. The router will send it to ISPRead more
Internshala ethical hacking final test answers:
1.Lease time is used in which protocol?
ANSWER: DHCP
2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching):
Entry will be checked in the hosts file.
The router will send it to ISP DNS provider using static IP.
DNS provider will send the request to .com TLD server.
DNS request will be sent to the router. .com will send it to Facebook authoritative name server. It will pick the IP address of api.facebook.com entry and return the IP back.
Facebook authoritative name server will check for subdomain entries.
Which of the following steps is missing here?
ANSWER: REQUEST SENT TO ROOT NAME SERVER
3. HTTPs requests are made so that the hackers cannot intercept them and see the data in them while they are being
transferred. This makes it impossible to intercept and tamper HTTPS requests.
ANSWER: FALSE
4.Which of the following commands is used to see what computers we are connected with?
[mepr-show rules=”18938″ unauth=”message”]
ANSWER: NETSTAT
5.Which layer in the OSI model is responsible to encode and compress data
ANSWER: PRESENTATION
6.In the below given google dork, what will be searched in the SQL files? “admin” ext:sql site:x.com intext:password -download
ANSWER: ADMIN AND PASSWORD
7.What is the purpose of “dnsdumpster.com”?
ANSWER:TO FIND SUB DOMAIN OF GIVEN DOMAIN
8.What can be the uses of “web.archive.org”?
ANSWER: ALL OF THE ABOVE
9.What will be the output of the following PHP code?
<?php
sa=1;
while($a <10){
echo(“hello”);
?>
ANSWER: INFINITE NEVER ENDING LOOP
10.Uploading a txt file when website is asking for jpg file. This is a part of:
ANSWER: VA
11.What will be the output of this SQL query?
SELECT news_title FROM news WHERE news_id=1 UNION SELECT password FROM users
ANSWER: A ROW CONTAINING ‘NEWS’ TITLE WHOSE ID IS 1 AND THEN ROWS CONTAINING ALL THE PASSWORDS IN THE USER TABLE
12.In time based SQL injection, we ask the website:
If length(database())>5 Then sleep(10)
If the website responds after 10 seconds, we get to know that the length of the database name is greater than 5.
ANSWER: TRUE
13.Which of the following sqlmap script can be used to load HTTP request from a file?
ANSWER: -r
14. Why do we need to put CA certificate of the burp in our browser?
ANSWER: ALL OF THE ABOVE
15.You can brute force cookies with Burp Suite.
ANSWER: TRUE
16. Below is a part of PHP code in the file upload function of a website. How will you bypass this and upload a usable PHP
shell on the website? if($filename contains “php”){ die(“GO AWAY HACKER!!!”); }
ANSWER: UPLOAD SHELL.PHP
17.Below is an XSS filter. How will you bypass it to create a popup?
Sinput $_GET[‘user_name’];
echo(remove_xss($input));
remove_xss($input)
convert Sinput to lowercase.
remove all double and single quotes
remove all “script” Remove all img, iframe, onclick, body, svg, button, div, video Remove all equal-to signs
}
ANSWER: <scrSCRIPT>alert(1);</scrSCRIPTipt>
18.In which of the following URL you are most likely to find an Apache tomcat login page?
ANSWER: HTTP:.//site.com/manager/html
19.The following exploit is made in which language? .https://www.exploit-db.com/exploits/46330 (Hint: You can open the exploit and check.)
ANSWER: NONE OF THE ABOVE
20.WordPress default login page is at which URL?
ANSWER: site.com/wp-login
21.You run Dirbuster and find the default login page of an application. You guess the password and get admin access to
the website. Which of the following will you not include in the PoC?
ANSWER: DIRBUSTER SCREENSHOT
22.You must put a detailed business impact in both developer and management level report.
ANSWER: TRUE
23. What is Phreaking?
ANSWER: HACKING INTO TELEPHONE NETWORKS
24.MAC address is used to logically trace the path to reach a device on the network.
ANSWER: FALSE
25.If you are connected to the internet at your home, which of these will you definitely have?
ANSWER: BOTH OF ABOVE
26.Which of the following is an internal IP address?
ANSWER: 172.16.96.123
27.How many valid IP addresses are possible in the given IP range (both ends included)? 192.168.0.0 to 192.168.255.255.
ANSWER: 65536
28.Which of these HTTP methods can be used to send data to a web server from a browser?
ANSWER: BOTH OF ABOVE
29.The more ports open on a server, the more are the chances of it being vulnerable.
ANSWER: TRUE
30.Proxy is better than VPN. This is true or false in terms of which of these factors?
ANSWER: COST
31.What will happen when the “yolo” button is clicked?
<body> <a href=”.http://google.com” id=”link1″>clickme</a>
<button onclick=’alert(document.getElementById(“link1”).href)’>yolo</button> </body>
ANSWER: POPUP WITH A TEXT : .http://google com
32.Which authentication bypass payload will work for this login query (assume your input will go in place of the word ‘admin’)? Select * from login where user=”admin” && pass=”password”
ANSWER: ” or 1=1–
33.What is the main purpose of UNION command in SQL?
ANSWER: JOIN OUTPUT OF 2 OR MORE QUERIES
34.Which of the following Intruder options is suitable for bruteforcing usernames and passwords?
ANSWER: CLUSTER BOMB
35. Which vulnerability is least probable in this URL: .http://site.com/home.php?document_id=1056
ANSWER: STORED XSS
36.What of the following is not a purpose of cookies?
ANSWER: HELP IN PREVENTING IN SQL INJECTION ATTACKS
37.Checking how many requests are coming from a specific user/IP for a specific resource like an account or some data,
and blocking them if too many requests are being made in a small amount of time is called
ANSWER: RATE LIMITING
38.NMAP is used for which of the following purposes?
ANSWER: ALL OF THE ABOVE
39.You report a vulnerability to a company telling them about a vulnerability in “Yoast SEO” plugin in their WordPress.
What will you recommend them to patch it?
ANSWER: INSTALL THE PATCH FOR YOAST SEO PLUGIN AND UPDATE THE PLUGIN TO ITS LATEST VERSION
40.Which of the following tools is used to find common files and folders on websites?
ANSWER: DIRBUSTER
[/mepr-show]
41. Burp Suite can be used to find vulnerabilities on its own, confirm
vulnerabilities found with other tools, and exploit
vulnerability to steal data.
ANSWER: TRUE
Each computer connected to the Internet must A. be-a Pentium …
The correct option to the question 'Each computer connected to the Internet must' is (B) have a unique IP address.
The correct option to the question ‘Each computer connected to the Internet must’ is (B) have a unique IP address.
See lessWhich of the following data structure is linear type?
The correct answer to this question 'Which of the following data structure is linear type' is (D) all of the above.
The correct answer to this question ‘Which of the following data structure is linear type’ is (D) all of the above.
See lessThe worst case time complexity of AVL tree is better in comparison to binary search tree for
The correct answer to the question 'The worst case time complexity of AVL tree is better in comparison to binary search tree for' is (C) search, insert and delete operations.
The correct answer to the question ‘The worst case time complexity of AVL tree is better in comparison to binary search tree for’ is (C) search, insert and delete operations.
See lessThe main objective of this lab activity is to help …
I hope you liked this website. Just follow us on Instagram and support us [spbsm-follow-buttons] For answer tap on the given attachment button:
I hope you liked this website.
Just follow us on Instagram and support us
For answer tap on the given attachment button:
Write a Python class named Rectangle constructed by a length …
# Rectangle class definition class Rectangle: """ This is a class for Rectangle to calculate the area Attributes: length: The length of the rectangle width: The width of the rectangle """ # class attribute shape shape="Rectangle" # constructor to initialize instance variables def __init__(self,lengtRead more
# Rectangle class definition
class Rectangle:
“””
This is a class for Rectangle to calculate the area
Attributes:
length: The length of the rectangle
width: The width of the rectangle
“””
# class attribute shape
shape=”Rectangle”
# constructor to initialize instance variables
def __init__(self,length,width):
self.length=length
self.width=width
# method to calculate and return area
def area(self):
return self.length*self.width
# shapeType() method
def shapeType(self):
print(“Shape type is”,self.shape)
def main():
See less# create an instance of Rectangle class
r=Rectangle(5,4)
# display class docs
print(Rectangle.__doc__)
# call ShapeType() method
r.shapeType()
# call area() method
print(“Area:”,r.area())
# calling main() function
main()
1. How will they be able to use the mobile …
1. How will they be able to use the mobile device for programming in c++. Answer: The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is iRead more
1. How will they be able to use the mobile device for programming in c++.
Answer:
The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is ideal.
But the best way to make executable modules for anything is on a large screen device with enough memory for the IDE compiler and linker to work well.
That means you cross-compile in [mepr-show rules=”18938″ unauth=”message”] an IDE like Visual Studio or Eclipse on a large workstation, and then download the executable module to the smartphone to run. Visual Studio comes with a built-in smartphone device emulator, so you can run your app before downloading it on the smartphone.
1.1. Identify and describe how they will be able to create c++ programs on their mobile device? You must also include the brand name in you or explanation
Answer:
Best method for this!
Done!
1.2. What are the limitations of using their mobile devices for programming?
Answer:
1. It is very hard to find a decent app.
2. Even if you find an app you have half of your screen covered by your keyboard.
3. It is very inconvenient to handle big codes on mobile phones. If it is a small program for practice purposes then it’s fine but for large programs, it will be difficult to handle the code.
4. Mobile phones do not provide a good development environment needed for developing software.
5. Typing on a small screen is bad if you wanna be fast. 6.Usually, no fast access to characters like {}[]()”‘#!=*.+/’-.<> etc. So you turn on the symbol bar. And there goes the num of lines you see from 5 to 3.
[/mepr-show]
See lessStudy the scenario and complete the question(s) that follow: You …
3.1 Explanation:- CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1 if x2 is less than or equal to x1 and x2 is less than or equal toRead more
3.1
Explanation:-
CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1
if x2 is less than or equal to x1 and x2 is less than or equal to x3 then return x2
Otherwise, return x3
Pseudocode:-
3.2
Explanation:-
AreaofTriangle() function, takes two float type values as input, and this function returns a float type value, inside this function, multiply base with height, then divide the result by 2, and store the result in float type variable, area, at the end return area
Pseudocode:-
3.3
Explanation:-
circumference() function, takes a float type value as input, and this function returns a float type value, inside this function, multiply 2 and 3.14 with radius, and store the result in float type variable, result, at the end return result
Pseudocode:-
See lessWhich of the following fields of application for AI can …
The correct answer to the question 'which of the following fields of application for AI can be used at the airport to flag weapons within luggage passing through the X-ray scanner' is (d) Computer Vision.
The correct answer to the question ‘which of the following fields of application for AI can be used at the airport to flag weapons within luggage passing through the X-ray scanner’ is (d) Computer Vision.
See less