Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

SIKSHAPATH

SIKSHAPATH Logo SIKSHAPATH Logo

SIKSHAPATH Navigation

  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Home/ethical hacking/Page 2

SIKSHAPATH Latest Questions

Pavanagg
  • 0
Pavanagg
Asked: March 15, 2022In: Other

Two messages M1 and M2 are fed to a hash function HASH to generate the hash values: H1 = HASH …

  • 0

Two messages M1 and M2 are fed to a hash function HASH to generate the hash values: H1 = HASH (M1) H2= HASH (M2) When do we say there is a collision? a. H1 = H2. b. M1 = M2. c. H1 = HASH (H2). d. None ...

ethical hackingnptel assignment
  • 1 Answer
  • 411 Views
Answer
Pavanagg
  • 1
Pavanagg
Asked: February 25, 2022In: Other

Which of the following may be used for password cracking?

  • 1

Which of the following may be used for password cracking? a. Dictionary attack. b. Social engineering attack. c. TCP SYN attack. d. DoS attack.

ethical hackingnptel assignment
  • 1 Answer
  • 678 Views
Answer
Pavanagg
  • 2
Pavanagg
Asked: February 25, 2022In: Other

Which of the following Tools can be used for Scanning Vulnerabilities MCQ

  • 2

Which of the following tools can be used for scanning vulnerabilities? a. Hypervisor b. Nessus c. Hydra d. Nmap

ethical hackingnptel assignment
  • 1 Answer
  • 521 Views
Answer
Pavanagg
  • 0
Pavanagg
Asked: February 18, 2022In: Other

Which of the following can be used for passive reconnaissance?

  • 0

Which of the following can be used for passive reconnaissance? a. Whois b. archive.org c. Netcraft d. Search engines

ethical hacking
  • 1 Answer
  • 524 Views
Answer
Pavanagg
  • 1
Pavanagg
Asked: February 18, 2022In: Other

What is the purpose of the Hypervisor software? a. It is a secure software layer that is difficult to hack. …

  • 1

What is the purpose of the Hypervisor software? a. It is a secure software layer that is difficult to hack. b. It opens a terminal window through which commands can be given directly. c. It can create and run ...

ethical hackingnptel assignment
  • 1 Answer
  • 309 Views
Answer
Berlin
  • 1
Berlin
Asked: January 24, 2022In: Other

Which of the following are valid port numbers in TCP/IP?  a. 10,000 b. 50,000 c. 100,000 d. 500,000 e. 750,000

  • 1

Which of the following are valid port numbers in TCP/IP?  a. 10,000 b. 50,000 c. 100,000 d. 500,000 e. 750,000

ethical hackingnptel ethical hacking
  • 1 Answer
  • 1k Views
Answer
1 2

Sidebar

store ads

Stats

  • Questions 1k
  • Answers 1k
  • Posts 141
  • Best Answers 89
  • Cloud Computing Notes 101: Learn Fundamentals, Service Models, and Virtualization!
  • This Free AI Tool Translates Entire Books in Minute !
  • 25 Essential Software Testing Questions: Flashcard Edition!
  • 27 C++ Questions & Answers – Quiz 1 Flashcards
  • Interactive Alphabet Flashcards for Kids: A to Z Learning Fun!

Explore

  • Recent Questions
  • Questions For You
  • Answers With Time
  • Most Visited
  • New Questions
  • Recent Questions With Time

Footer

SIKSHAPATH

Helpful Links

  • Contact
  • Disclaimer
  • Privacy Policy Notice
  • TERMS OF USE
  • FAQs
  • Refund/Cancellation Policy
  • Delivery Policy for Sikshapath

Follow Us

© 2021-24 Sikshapath. All Rights Reserved