Two messages M1 and M2 are fed to a hash function HASH to generate the hash values: H1 = HASH (M1) H2= HASH (M2) When do we say there is a collision? a. H1 = H2. b. M1 = M2. c. H1 = HASH (H2). d. None ...
Home/ethical hacking/Page 2
SIKSHAPATH Latest Questions
Pavanagg
Asked: February 25, 2022In: Other
Which of the following may be used for password cracking? a. Dictionary attack. b. Social engineering attack. c. TCP SYN attack. d. DoS attack.
Pavanagg
Asked: February 25, 2022In: Other
Which of the following tools can be used for scanning vulnerabilities? a. Hypervisor b. Nessus c. Hydra d. Nmap
Pavanagg
Asked: February 18, 2022In: Other
Which of the following can be used for passive reconnaissance? a. Whois b. archive.org c. Netcraft d. Search engines
Pavanagg
Asked: February 18, 2022In: Other
What is the purpose of the Hypervisor software? a. It is a secure software layer that is difficult to hack. b. It opens a terminal window through which commands can be given directly. c. It can create and run ...
Berlin
Asked: January 24, 2022In: Other
Which of the following are valid port numbers in TCP/IP? a. 10,000 b. 50,000 c. 100,000 d. 500,000 e. 750,000