Internshala ethical hacking final test answers: 1.Lease time is used in which protocol? ANSWER: DHCP 2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching): Entry will be checked in the hosts file. The router will send it to ISPRead more
Internshala ethical hacking final test answers:
1.Lease time is used in which protocol?
ANSWER: DHCP
2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching):
Entry will be checked in the hosts file.
The router will send it to ISP DNS provider using static IP.
DNS provider will send the request to .com TLD server.
DNS request will be sent to the router. .com will send it to Facebook authoritative name server. It will pick the IP address of api.facebook.com entry and return the IP back.
Facebook authoritative name server will check for subdomain entries.
Which of the following steps is missing here?
ANSWER:REQUEST SENT TO ROOT NAME SERVER
3. HTTPs requests are made so that the hackers cannot intercept them and see the data in them while they are being transferred. This makes it impossible to intercept and tamper HTTPS requests.
ANSWER: FALSE
4.Which of the following commands is used to see what computers we are connected with?
[mepr-show rules=”18938″ unauth=”message”]
ANSWER: NETSTAT
5.Which layer in the OSI model is responsible to encode and compress data
ANSWER: PRESENTATION
6.In the below given google dork, what will be searched in the SQL files? “admin” ext:sql site:x.com intext:password -download
ANSWER: ADMIN AND PASSWORD
7.What is the purpose of “dnsdumpster.com”?
ANSWER:TO FIND SUB DOMAIN OF GIVEN DOMAIN
8.What can be the uses of “web.archive.org”?
ANSWER: ALL OF THE ABOVE
9.What will be the output of the following PHP code?
<?php
sa=1;
while($a <10){
echo(“hello”);
?>
ANSWER: INFINITE NEVER ENDING LOOP
10.Uploading a txt file when website is asking for jpg file. This is a part of:
ANSWER: VA
11.What will be the output of this SQL query?
SELECT news_title FROM news WHERE news_id=1 UNION SELECT password FROM users
ANSWER: A ROW CONTAINING ‘NEWS’ TITLE WHOSE ID IS 1 AND THEN ROWS CONTAINING ALL THE PASSWORDS IN THE USER TABLE
12.In time based SQL injection, we ask the website:
If length(database())>5 Then sleep(10)
If the website responds after 10 seconds, we get to know that the length of the database name is greater than 5.
ANSWER: TRUE
13.Which of the following sqlmap script can be used to load HTTP request from a file?
ANSWER: -r
14. Why do we need to put CA certificate of the burp in our browser?
ANSWER: ALL OF THE ABOVE
15.You can brute force cookies with Burp Suite.
ANSWER: TRUE
16. Below is a part of PHP code in the file upload function of a website. How will you bypass this and upload a usable PHP shell on the website? if($filename contains “php”){ die(“GO AWAY HACKER!!!”); }
ANSWER: UPLOAD SHELL.PHP
17.Below is an XSS filter. How will you bypass it to create a popup?
Sinput $_GET[‘user_name’];
echo(remove_xss($input));
remove_xss($input)
convert Sinput to lowercase.
remove all double and single quotes
remove all “script” Remove all img, iframe, onclick, body, svg, button, div, video Remove all equal-to signs
}
ANSWER: <scrSCRIPT>alert(1);</scrSCRIPTipt>
18.In which of the following URL you are most likely to find an Apache tomcat login page?
32.Which authentication bypass payload will work for this login query (assume your input will go in place of the word ‘admin’)? Select * from login where user=”admin” && pass=”password”
ANSWER: ” or 1=1–
33.What is the main purpose of UNION command in SQL?
ANSWER: JOIN OUTPUT OF 2 OR MORE QUERIES
34.Which of the following Intruder options is suitable for bruteforcing usernames and passwords?
1. How will they be able to use the mobile device for programming in c++. Answer: The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is iRead more
1. How will they be able to use the mobile device for programming in c++.
Answer:
The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is ideal.
But the best way to make executable modules for anything is on a large screen device with enough memory for the IDE compiler and linker to work well.
That means you cross-compile in [mepr-show rules=”18938″ unauth=”message”] an IDE like Visual Studio or Eclipse on a large workstation, and then download the executable module to the smartphone to run. Visual Studio comes with a built-in smartphone device emulator, so you can run your app before downloading it on the smartphone.
1.1. Identify and describe how they will be able to create c++ programs on their mobile device? You must also include the brand name in you or explanation
Answer:
Best method for this!
Install Termux from Playstore! (Termux is Linux Terminal Emulator with many utilities!)
Open it, update & upgrade the packages using – apt-get update && apt-get upgrade
Now install Clang (C/C++ compiler) using this command – apt-get install -y clang
Create a .cpp file using this command – touch <filename>.cpp
Now edit this file, I mean add the codings, using nano – apt-get install -y nano and after the edit the file using – nano <filename>.cpp
After saving this, compile this source code using – clang <filename>.cpp
And the output file will be saved as a.out which you have to execute using – ./a.out
Done!
1.2. What are the limitations of using their mobile devices for programming?
Answer:
1. It is very hard to find a decent app.
2. Even if you find an app you have half of your screen covered by your keyboard.
3. It is very inconvenient to handle big codes on mobile phones. If it is a small program for practice purposes then it’s fine but for large programs, it will be difficult to handle the code.
4. Mobile phones do not provide a good development environment needed for developing software.
5. Typing on a small screen is bad if you wanna be fast. 6.Usually, no fast access to characters like {}[]()”‘#!=*.+/’-.<> etc. So you turn on the symbol bar. And there goes the num of lines you see from 5 to 3.
3.1 Explanation:- CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1 if x2 is less than or equal to x1 and x2 is less than or equal toRead more
3.1
Explanation:-
CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1
if x2 is less than or equal to x1 and x2 is less than or equal to x3 then return x2
Otherwise, return x3
Pseudocode:-
int CalcMin(int x1,int x2,int x3){
if x1<=x2 and x1<=x3:
return x1
else if x2<=x1 and x2<=x3:
return x2
[mepr-show rules="18938" unauth="message"]
else:
return x3
}
3.2
Explanation:-
AreaofTriangle() function, takes two float type values as input, and this function returns a float type value, inside this function, multiply base with height, then divide the result by 2, and store the result in float type variable, area, at the end return area
Pseudocode:-
float AreaofTriangle(float base,float height){
float area=(base*height)/2
return area
}
3.3
Explanation:-
circumference() function, takes a float type value as input, and this function returns a float type value, inside this function, multiply 2 and 3.14 with radius, and store the result in float type variable, result, at the end return result
Pseudocode:-
float circumference(float radius){
float result=(2*3.14*radius)
return result
}
[/mepr-show]
Internshala ethical hacking final test answers: Question sequence differs but …
Internshala ethical hacking final test answers: 1.Lease time is used in which protocol? ANSWER: DHCP 2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching): Entry will be checked in the hosts file. The router will send it to ISPRead more
Internshala ethical hacking final test answers:
1.Lease time is used in which protocol?
ANSWER: DHCP
2.When you type api.facebook.com in the browser, the following steps will be taken to resolve the name (ignore caching):
Entry will be checked in the hosts file.
The router will send it to ISP DNS provider using static IP.
DNS provider will send the request to .com TLD server.
DNS request will be sent to the router. .com will send it to Facebook authoritative name server. It will pick the IP address of api.facebook.com entry and return the IP back.
Facebook authoritative name server will check for subdomain entries.
Which of the following steps is missing here?
ANSWER: REQUEST SENT TO ROOT NAME SERVER
3. HTTPs requests are made so that the hackers cannot intercept them and see the data in them while they are being
transferred. This makes it impossible to intercept and tamper HTTPS requests.
ANSWER: FALSE
4.Which of the following commands is used to see what computers we are connected with?
[mepr-show rules=”18938″ unauth=”message”]
ANSWER: NETSTAT
5.Which layer in the OSI model is responsible to encode and compress data
ANSWER: PRESENTATION
6.In the below given google dork, what will be searched in the SQL files? “admin” ext:sql site:x.com intext:password -download
ANSWER: ADMIN AND PASSWORD
7.What is the purpose of “dnsdumpster.com”?
ANSWER:TO FIND SUB DOMAIN OF GIVEN DOMAIN
8.What can be the uses of “web.archive.org”?
ANSWER: ALL OF THE ABOVE
9.What will be the output of the following PHP code?
<?php
sa=1;
while($a <10){
echo(“hello”);
?>
ANSWER: INFINITE NEVER ENDING LOOP
10.Uploading a txt file when website is asking for jpg file. This is a part of:
ANSWER: VA
11.What will be the output of this SQL query?
SELECT news_title FROM news WHERE news_id=1 UNION SELECT password FROM users
ANSWER: A ROW CONTAINING ‘NEWS’ TITLE WHOSE ID IS 1 AND THEN ROWS CONTAINING ALL THE PASSWORDS IN THE USER TABLE
12.In time based SQL injection, we ask the website:
If length(database())>5 Then sleep(10)
If the website responds after 10 seconds, we get to know that the length of the database name is greater than 5.
ANSWER: TRUE
13.Which of the following sqlmap script can be used to load HTTP request from a file?
ANSWER: -r
14. Why do we need to put CA certificate of the burp in our browser?
ANSWER: ALL OF THE ABOVE
15.You can brute force cookies with Burp Suite.
ANSWER: TRUE
16. Below is a part of PHP code in the file upload function of a website. How will you bypass this and upload a usable PHP
shell on the website? if($filename contains “php”){ die(“GO AWAY HACKER!!!”); }
ANSWER: UPLOAD SHELL.PHP
17.Below is an XSS filter. How will you bypass it to create a popup?
Sinput $_GET[‘user_name’];
echo(remove_xss($input));
remove_xss($input)
convert Sinput to lowercase.
remove all double and single quotes
remove all “script” Remove all img, iframe, onclick, body, svg, button, div, video Remove all equal-to signs
}
ANSWER: <scrSCRIPT>alert(1);</scrSCRIPTipt>
18.In which of the following URL you are most likely to find an Apache tomcat login page?
ANSWER: HTTP:.//site.com/manager/html
19.The following exploit is made in which language? .https://www.exploit-db.com/exploits/46330 (Hint: You can open the exploit and check.)
ANSWER: NONE OF THE ABOVE
20.WordPress default login page is at which URL?
ANSWER: site.com/wp-login
21.You run Dirbuster and find the default login page of an application. You guess the password and get admin access to
the website. Which of the following will you not include in the PoC?
ANSWER: DIRBUSTER SCREENSHOT
22.You must put a detailed business impact in both developer and management level report.
ANSWER: TRUE
23. What is Phreaking?
ANSWER: HACKING INTO TELEPHONE NETWORKS
24.MAC address is used to logically trace the path to reach a device on the network.
ANSWER: FALSE
25.If you are connected to the internet at your home, which of these will you definitely have?
ANSWER: BOTH OF ABOVE
26.Which of the following is an internal IP address?
ANSWER: 172.16.96.123
27.How many valid IP addresses are possible in the given IP range (both ends included)? 192.168.0.0 to 192.168.255.255.
ANSWER: 65536
28.Which of these HTTP methods can be used to send data to a web server from a browser?
ANSWER: BOTH OF ABOVE
29.The more ports open on a server, the more are the chances of it being vulnerable.
ANSWER: TRUE
30.Proxy is better than VPN. This is true or false in terms of which of these factors?
ANSWER: COST
31.What will happen when the “yolo” button is clicked?
<body> <a href=”.http://google.com” id=”link1″>clickme</a>
<button onclick=’alert(document.getElementById(“link1”).href)’>yolo</button> </body>
ANSWER: POPUP WITH A TEXT : .http://google com
32.Which authentication bypass payload will work for this login query (assume your input will go in place of the word ‘admin’)? Select * from login where user=”admin” && pass=”password”
ANSWER: ” or 1=1–
33.What is the main purpose of UNION command in SQL?
ANSWER: JOIN OUTPUT OF 2 OR MORE QUERIES
34.Which of the following Intruder options is suitable for bruteforcing usernames and passwords?
ANSWER: CLUSTER BOMB
35. Which vulnerability is least probable in this URL: .http://site.com/home.php?document_id=1056
ANSWER: STORED XSS
36.What of the following is not a purpose of cookies?
ANSWER: HELP IN PREVENTING IN SQL INJECTION ATTACKS
37.Checking how many requests are coming from a specific user/IP for a specific resource like an account or some data,
and blocking them if too many requests are being made in a small amount of time is called
ANSWER: RATE LIMITING
38.NMAP is used for which of the following purposes?
ANSWER: ALL OF THE ABOVE
39.You report a vulnerability to a company telling them about a vulnerability in “Yoast SEO” plugin in their WordPress.
What will you recommend them to patch it?
ANSWER: INSTALL THE PATCH FOR YOAST SEO PLUGIN AND UPDATE THE PLUGIN TO ITS LATEST VERSION
40.Which of the following tools is used to find common files and folders on websites?
ANSWER: DIRBUSTER
[/mepr-show]
41. Burp Suite can be used to find vulnerabilities on its own, confirm
vulnerabilities found with other tools, and exploit
vulnerability to steal data.
ANSWER: TRUE
The main objective of this lab activity is to help …
I hope you liked this website. Just follow us on Instagram and support us [spbsm-follow-buttons] For answer tap on the given attachment button:
I hope you liked this website.
Just follow us on Instagram and support us
For answer tap on the given attachment button:
1. How will they be able to use the mobile …
1. How will they be able to use the mobile device for programming in c++. Answer: The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is iRead more
1. How will they be able to use the mobile device for programming in c++.
Answer:
The point is that smartphones are just small computers, and all computers primarily run the object module format produced by a C++ compiler. There is nothing that does not or can not run compiled C++ modules. That is ideal.
But the best way to make executable modules for anything is on a large screen device with enough memory for the IDE compiler and linker to work well.
That means you cross-compile in [mepr-show rules=”18938″ unauth=”message”] an IDE like Visual Studio or Eclipse on a large workstation, and then download the executable module to the smartphone to run. Visual Studio comes with a built-in smartphone device emulator, so you can run your app before downloading it on the smartphone.
1.1. Identify and describe how they will be able to create c++ programs on their mobile device? You must also include the brand name in you or explanation
Answer:
Best method for this!
Done!
1.2. What are the limitations of using their mobile devices for programming?
Answer:
1. It is very hard to find a decent app.
2. Even if you find an app you have half of your screen covered by your keyboard.
3. It is very inconvenient to handle big codes on mobile phones. If it is a small program for practice purposes then it’s fine but for large programs, it will be difficult to handle the code.
4. Mobile phones do not provide a good development environment needed for developing software.
5. Typing on a small screen is bad if you wanna be fast. 6.Usually, no fast access to characters like {}[]()”‘#!=*.+/’-.<> etc. So you turn on the symbol bar. And there goes the num of lines you see from 5 to 3.
[/mepr-show]
See lessStudy the scenario and complete the question(s) that follow: You …
3.1 Explanation:- CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1 if x2 is less than or equal to x1 and x2 is less than or equal toRead more
3.1
Explanation:-
CalcMin() function takes three integer type values as input, and this function returns an integer type value, inside this function, if x1 is less than or equal to x2 and x1 is less than or equal to x3 then return x1
if x2 is less than or equal to x1 and x2 is less than or equal to x3 then return x2
Otherwise, return x3
Pseudocode:-
3.2
Explanation:-
AreaofTriangle() function, takes two float type values as input, and this function returns a float type value, inside this function, multiply base with height, then divide the result by 2, and store the result in float type variable, area, at the end return area
Pseudocode:-
3.3
Explanation:-
circumference() function, takes a float type value as input, and this function returns a float type value, inside this function, multiply 2 and 3.14 with radius, and store the result in float type variable, result, at the end return result
Pseudocode:-
See lesswrite an pseudocode algothrim for the case below, assuming that …
Download Below Attachment for the Answer: Vote Up Answers For Support
Download Below Attachment for the Answer:
Vote Up Answers For Support
See lessA coin was tossed 400 times and the head turned up 216 times .Test the Hypothesis That the coin is …
Download Given attachment for answer: Click on attachment button for the answer
Download Given attachment for answer:
Click on attachment button for the answer
See less