You can grab banner by using  
A)Telnet B)NetCat C)Either A or B D)Both A and B

1 Answer

Answer :

D)Both A and B

Related questions

Description : You can grab banner by using A)Telnet B)NetCat C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above

Last Answer : D)All of Above

Description : 6 NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan

Last Answer : A)Network Mapper

Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat

Last Answer : c. John the ripper

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : Which tool is used for ping sweeps and port scanning? A. Netcat B. SamSpade C. SuperScan D. All the above

Last Answer : C. SuperScan

Description : Which of the following tool is used for Windows for network queries from DNS lookups to trace routes? A. Sam Spade B. SuperScan C. NetScan D. Netcat

Last Answer : A. Sam Spade

Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above

Last Answer : D)All of Above

Description : NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan

Last Answer : A)Network Mapper

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : What port does Telnet use? a. 22 b. 80 c. 20 d. 23

Last Answer : d. 23

Description : Telnet stands for (1) Telephone Network (2) Television Network (3) Teletype Network (4) Telefax Network

Last Answer : Telephone Network

Description : Telnet is a : (1) browser (2) protocol (3) gateway (4) search engine

Last Answer : protocol

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : ___for ping sweeps and port scanning a) Sam Spade b) SuperScan c) NetScan d) NetCat

Last Answer : b) SuperScan

Description : Which of the following tools is used for Networks Testing and port Scanning a) NetCat b) SuperScan c) NetScan d) All of Above

Last Answer : d) All of Above

Description : Is there an easy way for a developer to grab the list of feeds someone subscribes to in Google Reader using their account name and password?

Last Answer : There is not a solid, published API yet but there are some efforts to unofficially document it, but it’s prone to change. Just do a search for “Google Reader API” and there are some docs out there that unofficially show how you can get someone’s feed list though.

Description : How can I grab files off a Mac formatted 3.5" floppy (circa 1994) using a Windows '98 machine with a 3.5" drive, a Vista machine with no floppy drive and a MacBook with no floppy drive?

Last Answer : Sell one of those ridiculous computers and buy a USB floppy drive.

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Usually downloaded into folders that hold temporary internet files, _____ are written to your computer's hard disk by some of the websites you visit. a) anonymous files b) behaviour files c) banner ads d) cookies e) None of these

Last Answer : d) cookies

Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner

Last Answer : d. Banner

Description : What is Banner Grabbing ? a. Act of capturing the information by banners b. Grabbing Information c. Information Sharing d. Sharing Information

Last Answer : a. Act of capturing the information by banners

Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies

Last Answer : a. White hat hacking

Description : . Banner grabbing is an example of what?  Footprinting  Active operating system fingerprinting  Passive operating system fingerprinting  Application analysis

Last Answer :  Passive operating system fingerprinting

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies

Last Answer : (a) white hat hacking

Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies

Last Answer : A. White Hat Hacking

Description : The first and the only bowler grab hat-trick in both innings of the same Test. A. Jim Laker (England) B. C. Jimmy Matthews (Australia) D.

Last Answer : ANSWER: C

Description : The first and the only bowler grab hat-trick in both innings of the same Test. A. Jim Laker (England) B. C. Jimmy Matthews (Australia) D.

Last Answer : ANSWER: C

Description : The first and the only bowler grab hat-trick in both innings of the same Test. A. Jim Laker (England) B. C. Jimmy Matthews (Australia) D.

Last Answer : ANSWER: C

Description : The first and the only bowler grab hat-trick in both innings of the same Test. A. Jim Laker (England) B. C. Jimmy Matthews (Australia) D.

Last Answer : ANSWER: C

Description : This operates algorithmically or using a mixture of algorithmic and human input to collect, index, store and retrieve information on the web (e.g. web pages, images, information and other types of files). It makes the ... is referred to as: 1. Banner ads 2. Pop-up ads 3. A search engine 4. Apps

Last Answer : A search engine

Description : What do you understand by telnet? -Technology

Last Answer : Telnet is a protocol that facilitates remote login on a computer.

Description : Distinguish between FTP and Telnet. -Technology

Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.

Description : What is Telnet ?

Last Answer : The service through which a user can log in to a computer in a remote location and use the resource from it, the service is called Telnet . . The local computer on the telnet can be compared to the computer that is connected to the terminal and the remote location to the host .

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : Data communications monitors available on the software marked include a. ENVIRON/1 b. TOTAL c. BPL d. Telnet

Last Answer : ENVIRON/1

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer