Description : _______vulnerability is one for which at least one working attack exists: a) Democratic b) Exploitable c) Dominative d) None of These
Last Answer : b) Exploitable
Description : In India economically exploitable lignite deposits occur at (a) Neyveli, Tamil Nadu (b) Singareni, Andhra Pradesh (c) Talcher, Odisha (d) Jharia, Bihar
Last Answer : Ans: (a)
Description : Economically exploitable Gypsum occurs in (a) Andhra Pradesh (b) Bihar (c) Rajasthan (d) Maharashtra
Last Answer : Ans: (c)
Description : Economically exploitable lignite occurs in (a) Andhra Pradesh (b) Tamil Nadu (c) Karnataka (d) Kerala shop.ssbcrack.com
Last Answer : Ans: (b)
Description : 50. Which of the following statements is true with respect to the optimal solution of an LP problem? a. Every LP problem has an optimal solution b. Optimal solution of an LP problem always occurs ... completely used d. If an optimal solution exists, there will always be at least one at a corner
Last Answer : d. If an optimal solution exists, there will always be at least one at a corner
Description : Full employment exists when there is (a) Zero unemployment ; (b) Natural rate of unemployment ; (c) Least demand for labor (d) Least supply of labor
Last Answer : (b) Natural rate of unemployment
Description : Which of the following is least acceptable in the light of the modern concept of education? Options: A) The personal and social adjustment of the child is a responsibility of the school must ... directly involved in the methods and procedures by means of which these products are to be attained
Last Answer : B) Despite the importance of its other responsibilities, the school exists primarily for the purpose of developing the intellectual and the academic atmosphere
Description : “At least one-fourth of the globe is still not under democratic government.” -SST 10th
Last Answer : . The challenge to democracy in these parts is very stark. . These countries face the foundational challenge of making the transition to democracy and then instituting a democratic government. ... kept away from the controlling government and a sovereign and functional state should be established.
Description : Why do we need at least two parties in a democratic system? -SST 10th
Last Answer : It gives a fair chance to the two parties to compete in elections to come to power.
Description : Would you agree that the Democratic party has abandoned its traditional constituency, the working class?
Last Answer : No.
Description : How many types of storage loops exists in magnetic bubble memory A) 8 B) 4 C) 16 D) 2
Last Answer : Answer : D
Description : Which of the following floppy sizes exists? 1) 5.25 inches 2) 4.75 inches 3) 6 inches 4) 8 inches
Last Answer : 1) 5.25 inches
Description : Why does a H+ ion attacking a carbon-carbon double bond add to the carbon with the least number of substituents? (a) the reaction is resonance stabilized. (b) the hybrid geometry favors this ... tends to attack stable centers of negative charge. (d) a more stable carbonium ion is generated.
Last Answer : a more stable carbonium ion is generated.
Description : Heart attack occurs due to : (1) Bacterial attack on the heart (2) Stopping of heart beat (3) Lack of blood supply to the heart itself (4) Impairment of heart’s working due to unknown reasons
Last Answer : (3) Lack of blood supply to the heart itself Explanation: A heart attack occurs if the flow of oxygen-rich blood to a section of heart muscle suddenly becomes blocked. If blood) flow isn' ... plaque (plak) builds up inside the coronary arteries. These arteries supply oxygen-rich blood to the heart.
Description : Heart attack occurs due to – (1) Bacterial attack on the heart (2) Stopping of heart beat (3) Lack of supply of blood to the heart itself (4) Impairment of heart's working due to unknown reasons
Last Answer : (3) Lack of supply of blood to the heart itself Explanation: A heart attack occurs when blood flow to a part of your heart is blocked for a long enough time that part of the heart, muscle is damaged ... to the heart. If the blood flow is blocked, the heart is starved of oxygen and heart cells die.
Description : The cause of Heart attack is: (1) bacteria (2) virus (3) lack of blood supply to the heart (4) impairment of heart's working due to unknown reason
Last Answer : (3) lack of blood supply to the heart Explanation: Heart attack is the death of a segment of heart muscle caused by the loss of blood supply. It occurs when the blood flow that brings oxygen ... artery, one that supplies blood to the heart muscle, is blocked by a blood clot (coronary thrombosis).
Description : The cause of Heart attack is: (1) bacteria (2) virus (3) lack of blood supply to the heart (4) impairment of heart’s working due to unknown reason
Last Answer : lack of blood supply to the heart
Last Answer : Lack of blood supply to the heart itself
Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning
Last Answer : D. Reconnaissance
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above
Last Answer : A)Attachment Overloading Attack
Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner
Last Answer : d. Banner
Description : An attackers can create an …....attack by sending hundreds or thousand of e-mail with very large attachment. a. Connection Attack b. Auto responder Attack c. Attachment overloading Attack d. All of the above
Last Answer : c. Attachment overloading Attack
Last Answer : D. Internal attack
Description : . What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : What is the attack called “evil twin”? Rogue access point ARP poisoning Session hijacking MAC spoofing
Last Answer : MAC spoofing
Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack
Last Answer : d. SQL Injection attack
Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack
Last Answer : d. XSS attack
Description : Select the most appropriate option for the below two statements. I. A Dos attack can take down your internet connection II. A Dos attack can take down your entire system a. Both I and II are true b. I is true II is false c. I is false II is True d. Both I and II are false
Last Answer : a. Both I and II are true
Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off
Last Answer : c. To overload a system so it is no longer operational
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning
Last Answer : e. Scanning
Description : when a hackers attempt to attack a host via the internet is the know as what type of attack (a) remote attack (b) local access (c) internal attack (d) physical access
Last Answer : (a) remote attack
Description : an attack can create and attack by sending hundreds or thousand of e-mail with very large attachment (a) connection attack (b) auto responder attack (c) attachment overloading attack (d) all of the above
Last Answer : (c) attachment overloading attack
Description : what is the first phase of hacking (a) attack (b) maintaining access (c) gaining access (d) reconnaissance
Last Answer : (d) reconnaissance
Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above
Last Answer : B. Auto responder Attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : What is the first phase of hacking? ∙ A. Attack ∙ B. Maintaining access ∙ C. Gaining access ∙ D. Reconnaissance