Q1. NMAP command can be used for? a. Host Discovery b. Port Scanning c. Service and Version Detection d. OS Detection e. Vulnerability Scanning Q2. In UDP sweep scan, a scanner sends a UDP datagram and receives an ...
SIKSHAPATH Latest Questions
Which of the following Metasploit module can be used for vulnerability scanning and brute force attack? a. Encoder b. Payload c. Exploit d. Auxiliary
Which of the following statement(s) is/are false for side channel attacks? a. They exploit weaknesses in cryptographic algorithms. b. They exploit weaknesses in algorithm implementations. c. They do not require physical access to the device. d. None of these.
Which of the following are examples of hardware-based attacks? a. Side-channel attack. b. Physical probing. c. Denial of service stack. d. SQL injection attack
Consider a color image of size 2000 x 2000, where each pixel is stored in 24-bits (containing red, green and blue components as 8-bits each). How many bytes of information can be hidden in the image by using LSB steganography ...
Which of the following statements correctly represents the term steganography? a. Encrypting information so that it will not be legible to an unauthorized person. b. Hiding information within some cover media file. c. Secure way of communicating without sharing any key. d. None of ...