Two messages M1 and M2 are fed to a hash function HASH to generate the hash values: H1 = HASH (M1) H2= HASH (M2) When do we say there is a collision? a. H1 = H2. b. M1 = M2. c. H1 = HASH (H2). d. None ...
SIKSHAPATH Latest Questions
Which of the following may be used for password cracking? a. Dictionary attack. b. Social engineering attack. c. TCP SYN attack. d. DoS attack.
Which of the following tools can be used for scanning vulnerabilities? a. Hypervisor b. Nessus c. Hydra d. Nmap
Which of the following can be used for passive reconnaissance? a. Whois b. archive.org c. Netcraft d. Search engines
Which of the following statement(s) is/are true about passive reconnaissance? a. Information about the target is collected indirectly. b. Information about the target is collected directly. c. There is no direct communication with the target system. d. There is direct communication ...
What is the purpose of the Hypervisor software? a. It is a secure software layer that is difficult to hack. b. It opens a terminal window through which commands can be given directly. c. It can create and run ...