Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

SIKSHAPATH

SIKSHAPATH Logo SIKSHAPATH Logo

SIKSHAPATH Navigation

  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Home/ethical hacking/Page 2

SIKSHAPATH Latest Questions

Pavanagg
  • 0
Pavanagg
Asked: March 15, 2022In: Other

Two messages M1 and M2 are fed to a hash function HASH to generate the hash values: H1 = HASH …

  • 0

Two messages M1 and M2 are fed to a hash function HASH to generate the hash values: H1 = HASH (M1) H2= HASH (M2) When do we say there is a collision? a. H1 = H2. b. M1 = M2. c. H1 = HASH (H2). d. None ...

ethical hackingnptel assignment
  • 1 Answer
  • 395 Views
Answer
Pavanagg
  • 1
Pavanagg
Asked: February 25, 2022In: Other

Which of the following may be used for password cracking?

  • 1

Which of the following may be used for password cracking? a. Dictionary attack. b. Social engineering attack. c. TCP SYN attack. d. DoS attack.

ethical hackingnptel assignment
  • 1 Answer
  • 663 Views
Answer
Pavanagg
  • 2
Pavanagg
Asked: February 25, 2022In: Other

Which of the following Tools can be used for Scanning Vulnerabilities MCQ

  • 2

Which of the following tools can be used for scanning vulnerabilities? a. Hypervisor b. Nessus c. Hydra d. Nmap

ethical hackingnptel assignment
  • 1 Answer
  • 515 Views
Answer
Pavanagg
  • 0
Pavanagg
Asked: February 18, 2022In: Other

Which of the following can be used for passive reconnaissance?

  • 0

Which of the following can be used for passive reconnaissance? a. Whois b. archive.org c. Netcraft d. Search engines

ethical hacking
  • 1 Answer
  • 509 Views
Answer
Pavanagg
  • 1
Pavanagg
Asked: February 18, 2022In: Other

What is the purpose of the Hypervisor software? a. It is a secure software layer that is difficult to hack. …

  • 1

What is the purpose of the Hypervisor software? a. It is a secure software layer that is difficult to hack. b. It opens a terminal window through which commands can be given directly. c. It can create and run ...

ethical hackingnptel assignment
  • 1 Answer
  • 300 Views
Answer
Berlin
  • 1
Berlin
Asked: January 24, 2022In: Other

Which of the following are valid port numbers in TCP/IP?  a. 10,000 b. 50,000 c. 100,000 d. 500,000 e. 750,000

  • 1

Which of the following are valid port numbers in TCP/IP?  a. 10,000 b. 50,000 c. 100,000 d. 500,000 e. 750,000

ethical hackingnptel ethical hacking
  • 1 Answer
  • 1k Views
Answer
1 2

Sidebar

store ads

Stats

  • Questions 1k
  • Answers 1k
  • Posts 149
  • Best Answers 89
  • This Free AI Tool Translates Entire Books in Minute !
  • AI News: 🎬 Hollywood’s AI Studios, 🎓 OpenAI’s Latest Gift to Educators, 🚚 Class8 Bags $22M, 🧠 Google Gemini’s Memory Upgrade
  • AI NEWS: Legal Action Against OpenAI, $16M Paid, & Elon Musk’s Praise from Investor 🤖💰📑 | AI Boosts Cloud Seeding for Water Security 🌱💧
  • AI News: 🎬AI Video Tool Scam Exposed🤯, 🛰️ AI-Powered Drones to Ukraine 😱, Google’s $20M AI Push, Sam Altman Joins SF’s Leadership Team
  • AI News: 🤝 Biden Meets Xi on AI Talks, 💡 Xavier Niel’s Advice for Europe, ♻️ Hong Kong’s Smart Bin Revolution, 🚀 AI x Huawei

Explore

  • Recent Questions
  • Questions For You
  • Answers With Time
  • Most Visited
  • New Questions
  • Recent Questions With Time

Footer

SIKSHAPATH

Helpful Links

  • Contact
  • Disclaimer
  • Privacy Policy Notice
  • TERMS OF USE
  • FAQs
  • Refund/Cancellation Policy
  • Delivery Policy for Sikshapath

Follow Us

© 2021-24 Sikshapath. All Rights Reserved