Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

SIKSHAPATH

SIKSHAPATH Logo SIKSHAPATH Logo

SIKSHAPATH Navigation

  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
  • About
    1. Asked: July 16, 2022In: Other

      Internshala ethical hacking final test answers: Question sequence differs but …

      I'M ADMIN
      I'M ADMIN
      Added an answer on July 17, 2022 at 10:34 am
      This answer was edited.

      Internshala ethical hacking final test answers: 1.Lease time is used in which protocol? ANSWER: DHCP   2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching): Entry will be checked in the hosts file. The router will send it to ISPRead more

      Internshala ethical hacking final test answers:

      1.Lease time is used in which protocol?

      ANSWER: DHCP

       

      2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching):

      Entry will be checked in the hosts file.

      The router will send it to ISP DNS provider using static IP.

      DNS provider will send the request to .com TLD server.

      DNS request will be sent to the router. .com will send it to Facebook authoritative name server. It will pick the IP address of api.facebook.com entry and return the IP back.

      Facebook authoritative name server will check for subdomain entries.

      Which of the following steps is missing here?

      ANSWER: REQUEST SENT TO ROOT NAME SERVER

       

      3. HTTPs requests are made so that the hackers cannot intercept them and see the data in them while they are being
      transferred. This makes it impossible to intercept and tamper HTTPS requests.

      ANSWER: FALSE

       

      4.Which of the following commands is used to see what computers we are connected with?

      [mepr-show rules=”18938″ unauth=”message”]

      ANSWER: NETSTAT

       

       

      5.Which layer in the OSI model is responsible to encode and compress data

      ANSWER: PRESENTATION

       

      6.In the below given google dork, what will be searched in the SQL files? “admin” ext:sql site:x.com intext:password -download

      ANSWER: ADMIN AND PASSWORD

       

      7.What is the purpose of “dnsdumpster.com”?

      ANSWER:TO FIND SUB DOMAIN OF GIVEN DOMAIN

       

      8.What can be the uses of “web.archive.org”?

      ANSWER: ALL OF THE ABOVE

       

      9.What will be the output of the following PHP code?

      <?php

      sa=1;

      while($a <10){

      echo(“hello”);

      ?>

      ANSWER: INFINITE NEVER ENDING LOOP

       

      10.Uploading a txt file when website is asking for jpg file. This is a part of:

      ANSWER: VA

      11.What will be the output of this SQL query?

      SELECT news_title FROM news WHERE news_id=1 UNION SELECT password FROM users

      ANSWER: A ROW CONTAINING ‘NEWS’ TITLE WHOSE ID IS 1 AND THEN ROWS CONTAINING ALL THE PASSWORDS IN THE USER TABLE

      12.In time based SQL injection, we ask the website:

      If length(database())>5 Then sleep(10)

      If the website responds after 10 seconds, we get to know that the length of the database name is greater than 5.

      ANSWER: TRUE

      13.Which of the following sqlmap script can be used to load HTTP request from a file?

      ANSWER: -r

       

      14. Why do we need to put CA certificate of the burp in our browser?

      ANSWER: ALL OF THE ABOVE

       

      15.You can brute force cookies with Burp Suite.

      ANSWER: TRUE

       

      16. Below is a part of PHP code in the file upload function of a website. How will you bypass this and upload a usable PHP
      shell on the website? if($filename contains “php”){ die(“GO AWAY HACKER!!!”); }

      ANSWER: UPLOAD SHELL.PHP

       

      17.Below is an XSS filter. How will you bypass it to create a popup?

      Sinput $_GET[‘user_name’];

      echo(remove_xss($input));

      remove_xss($input)

      convert Sinput to lowercase.

      remove all double and single quotes

      remove all “script” Remove all img, iframe, onclick, body, svg, button, div, video Remove all equal-to signs

      }

      ANSWER: <scrSCRIPT>alert(1);</scrSCRIPTipt>

       

      18.In which of the following URL you are most likely to find an Apache tomcat login page?

      ANSWER: HTTP:.//site.com/manager/html

       

      19.The following exploit is made in which language? .https://www.exploit-db.com/exploits/46330 (Hint: You can open the exploit and check.)

      ANSWER: NONE OF THE ABOVE

       

      20.WordPress default login page is at which URL?

      ANSWER: site.com/wp-login

       

      21.You run Dirbuster and find the default login page of an application. You guess the password and get admin access to

      the website. Which of the following will you not include in the PoC?

      ANSWER: DIRBUSTER SCREENSHOT

       

      22.You must put a detailed business impact in both developer and management level report.

      ANSWER: TRUE

       

      23. What is Phreaking?

      ANSWER:  HACKING INTO TELEPHONE NETWORKS

       

      24.MAC address is used to logically trace the path to reach a device on the network.

      ANSWER: FALSE

       

      25.If you are connected to the internet at your home, which of these will you definitely have?

      ANSWER: BOTH OF ABOVE

       

      26.Which of the following is an internal IP address?

      ANSWER: 172.16.96.123

       

      27.How many valid IP addresses are possible in the given IP range (both ends included)? 192.168.0.0 to 192.168.255.255.

      ANSWER: 65536

       

      28.Which of these HTTP methods can be used to send data to a web server from a browser?

      ANSWER: BOTH OF ABOVE

       

      29.The more ports open on a server, the more are the chances of it being vulnerable.

      ANSWER: TRUE

       

      30.Proxy is better than VPN. This is true or false in terms of which of these factors?

      ANSWER: COST

       

      31.What will happen when the “yolo” button is clicked?

      <body> <a href=”.http://google.com” id=”link1″>clickme</a>

      <button onclick=’alert(document.getElementById(“link1”).href)’>yolo</button> </body>

      ANSWER: POPUP WITH A TEXT : .http://google com

       

      32.Which authentication bypass payload will work for this login query (assume your input will go in place of the word ‘admin’)? Select * from login where user=”admin” && pass=”password”

      ANSWER: ” or 1=1–

       

      33.What is the main purpose of UNION command in SQL?

      ANSWER: JOIN OUTPUT OF 2 OR MORE QUERIES

       

      34.Which of the following Intruder options is suitable for bruteforcing usernames and passwords?

      ANSWER: CLUSTER BOMB

       

      35. Which vulnerability is least probable in this URL: .http://site.com/home.php?document_id=1056

      ANSWER: STORED XSS

       

      36.What of the following is not a purpose of cookies?

      ANSWER: HELP IN PREVENTING IN SQL INJECTION ATTACKS

       

      37.Checking how many requests are coming from a specific user/IP for a specific resource like an account or some data,

      and blocking them if too many requests are being made in a small amount of time is called

      ANSWER: RATE LIMITING

       

      38.NMAP is used for which of the following purposes?

      ANSWER: ALL OF THE ABOVE

       

      39.You report a vulnerability to a company telling them about a vulnerability in “Yoast SEO” plugin in their WordPress.

      What will you recommend them to patch it?

      ANSWER: INSTALL THE PATCH FOR YOAST SEO PLUGIN AND UPDATE THE PLUGIN TO ITS LATEST VERSION

       

      40.Which of the following tools is used to find common files and folders on websites?

      ANSWER: DIRBUSTER

      [/mepr-show]

      41. Burp Suite can be used to find vulnerabilities on its own, confirm

      vulnerabilities found with other tools, and exploit
      vulnerability to steal data.

      ANSWER: TRUE

       

      See less
        • -3
      • Share
        Share
        • Share on WhatsApp
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    2. Asked: June 25, 2022In: C language

      The main objective of this lab activity is to help …

      I'M ADMIN
      I'M ADMIN
      Added an answer on June 25, 2022 at 11:43 am

      I hope you liked this website. Just follow us on Instagram and support us [spbsm-follow-buttons] For answer tap on the given attachment button:  

      I hope you liked this website.

      Just follow us on Instagram and support us

      Follow us on Social Media
      twitterwhatsapp

      For answer tap on the given attachment button:

       

      See less
      Attachment

        • 0
      • Share
        Share
        • Share on WhatsApp
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    3. Asked: June 14, 2022In: Software Engineering

      1. How will they be able to use the mobile …

      I'M ADMIN
      I'M ADMIN
      Added an answer on June 15, 2022 at 5:19 pm

      1. How will they be able to use the mobile device for programming in c++. Answer: The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is iRead more

      1. How will they be able to use the mobile device for programming in c++.

      Answer:

      The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is ideal.

      But the best way to make executable modules for anything is on a large screen device with enough memory for the IDE compiler and linker to work well.

      That means you cross-compile in [mepr-show rules=”18938″ unauth=”message”] an IDE like Visual Studio or Eclipse on a large workstation, and then download the executable module to the smartphone to run. Visual Studio comes with a built-in smartphone device emulator, so you can run your app before downloading it on the smartphone.

       

      1.1. Identify and describe how they will be able to create c++ programs on their mobile device? You must also include the brand name in you or explanation

      Answer:

      Best method for this!

      1. Install Termux from Playstore! (Termux is Linux Terminal Emulator with many utilities!)
      2. Open it, update & upgrade the packages using – apt-get update && apt-get upgrade
      3. Now install Clang (C/C++ compiler) using this command – apt-get install -y clang
      4. Create a .cpp file using this command – touch <filename>.cpp
      5. Now edit this file, I mean add the codings, using nano – apt-get install -y nano and after the edit the file using – nano <filename>.cpp
      6. After saving this, compile this source code using – clang <filename>.cpp
      7. And the output file will be saved as a.out which you have to execute using – ./a.out

      Done!

       

      1.2. What are the limitations of using their mobile devices for programming?

      Answer:

      1. It is very hard to find a decent app.

      2. Even if you find an app you have half of your screen covered by your keyboard.

      3. It is very inconvenient to handle big codes on mobile phones. If it is a small program for practice purposes then it’s fine but for large programs, it will be difficult to handle the code.

      4. Mobile phones do not provide a good development environment needed for developing software.

      5. Typing on a small screen is bad if you wanna be fast. 6.Usually, no fast access to characters like {}[]()”‘#!=*.+/’-.<> etc. So you turn on the symbol bar. And there goes the num of lines you see from 5 to 3.

      [/mepr-show]

      See less
        • 0
      • Share
        Share
        • Share on WhatsApp
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    4. Asked: June 14, 2022In: Programming Language

      Study the scenario and complete the question(s) that follow: You …

      I'M ADMIN
      I'M ADMIN
      Added an answer on June 15, 2022 at 4:54 pm

      3.1 Explanation:- CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1 if x2 is less than or equal to x1 and x2 is less than or equal toRead more

      3.1

      Explanation:-

      CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1

      if x2 is less than or equal to x1 and x2 is less than or equal to x3 then return x2

      Otherwise, return x3

      Pseudocode:-

      int CalcMin(int x1,int x2,int x3){
          if x1<=x2 and x1<=x3:
              return x1
          else if x2<=x1 and x2<=x3:
              return x2
      [mepr-show rules="18938" unauth="message"] 
          else:
              return x3  
      }

      3.2

      Explanation:-

      AreaofTriangle() function, takes two float type values as input, and this function returns a float type value, inside this function, multiply base with height, then divide the result by 2, and store the result in float type variable, area, at the end return area

      Pseudocode:-

      float AreaofTriangle(float base,float height){
          float area=(base*height)/2
          return area
      }

      3.3

      Explanation:-

      circumference() function, takes a float type value as input, and this function returns a float type value, inside this function, multiply 2 and 3.14 with radius, and store the result in float type variable, result, at the end return result

      Pseudocode:-

      float circumference(float radius){
          float result=(2*3.14*radius)
          return result
      }
      
      [/mepr-show]
      See less
        • 0
      • Share
        Share
        • Share on WhatsApp
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    5. Asked: June 12, 2022In: Software Engineering

      write an pseudocode algothrim for the case below, assuming that …

      I'M ADMIN
      I'M ADMIN
      Added an answer on June 14, 2022 at 1:23 pm

      Download Below Attachment for the Answer: Vote Up Answers For Support

      Download Below Attachment for the Answer:

      Vote Up Answers For Support

      See less
      Attachment

        • 0
      • Share
        Share
        • Share on WhatsApp
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    6. Asked: April 8, 2022In: Mathematics

      A coin was tossed 400 times and the head turned up 216 times .Test the Hypothesis That the coin is …

      I'M ADMIN
      I'M ADMIN
      Added an answer on June 14, 2022 at 1:09 pm

      Download Given attachment for answer: Click on attachment button for the answer

      Download Given attachment for answer:

      Click on attachment button for the answer

      See less
      Attachment

        • 0
      • Share
        Share
        • Share on WhatsApp
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    1 … 8 9 10 11 12 … 122

    Sidebar

    store ads

    Stats

    • Questions 1k
    • Answers 1k
    • Posts 149
    • Best Answers 89
    • This Free AI Tool Translates Entire Books in Minute !
    • AI News: 🎬 Hollywood’s AI Studios, 🎓 OpenAI’s Latest Gift to Educators, 🚚 Class8 Bags $22M, 🧠 Google Gemini’s Memory Upgrade
    • AI NEWS: Legal Action Against OpenAI, $16M Paid, & Elon Musk’s Praise from Investor 🤖💰📑 | AI Boosts Cloud Seeding for Water Security 🌱💧
    • AI News: 🎬AI Video Tool Scam Exposed🤯, 🛰️ AI-Powered Drones to Ukraine 😱, Google’s $20M AI Push, Sam Altman Joins SF’s Leadership Team
    • AI News: 🤝 Biden Meets Xi on AI Talks, 💡 Xavier Niel’s Advice for Europe, ♻️ Hong Kong’s Smart Bin Revolution, 🚀 AI x Huawei

    Explore

    • Recent Questions
    • Questions For You
    • Answers With Time
    • Most Visited
    • New Questions
    • Recent Questions With Time

    Footer

    SIKSHAPATH

    Helpful Links

    • Contact
    • Disclaimer
    • Privacy Policy Notice
    • TERMS OF USE
    • FAQs
    • Refund/Cancellation Policy
    • Delivery Policy for Sikshapath

    Follow Us

    © 2021-24 Sikshapath. All Rights Reserved