Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above
Last Answer : D)All of Above
Description : Which of the following tool is used for Windows for network queries from DNS lookups to trace routes? A. Sam Spade B. SuperScan C. NetScan D. Netcat
Last Answer : A. Sam Spade
Description : Which of the following tools is used for Networks Testing and port Scanning a) NetCat b) SuperScan c) NetScan d) All of Above
Last Answer : d) All of Above
Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat
Last Answer : c. John the ripper
Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan
Last Answer : A. Netcat
Description : ___for ping sweeps and port scanning a) Sam Spade b) SuperScan c) NetScan d) NetCat
Last Answer : b) SuperScan
Description : 6 NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan
Last Answer : A)Network Mapper
Description : NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan
Description : Network Testing and port scanning tools are : a. Sam Spade b. SuperScan c. NetScan d. All of the above
Last Answer : d. All of the above
Description : Which tool is used for ping sweeps and port scanning? A. Netcat B. SamSpade C. SuperScan D. All the above
Last Answer : C. SuperScan
Description : You can grab banner by using A)Telnet B)NetCat C)Either A or B D)Both A and B
Last Answer : D)Both A and B
Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555
Last Answer : a. 65535
Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network
Last Answer : c. Security Administrator Tool for Analysis Networks
Description : What tool can be used to perform SNMP enumeration? a. DNSlookup b. Whois c. Nslookup d. IP Network Browser
Last Answer : d. IP Network Browser
Description : Adaptive maintenance is a maintenance which ............. (A) Correct errors that were not discovered till testing phase. (B) is carried out to port the existing software to a new environment. (C) improves the system performance. (D) both (B) and (C)
Last Answer : (B) is carried out to port the existing software to a new environment.
Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing
Last Answer : C. White-box testing
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing
Last Answer : c. White-box testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing
Description : Which is the most widely used automation testing tool?
Last Answer : Selenium would be most widely used automation testing tool. It is a open source testing framework used in testing applications of different platforms. It allows the testers to write scripts in a domain ... Firefox Opera Safari Internet Explorer 7, 8, 9, 10 and 11 HtmlUnit PhantomJS Android iOS
Description : Jumper is a tool used for (A) Testing of stones (B) Quarrying of stones (C) Dressing of stones (D) None of the above
Last Answer : Answer: Option B
Description : Which of the following is the task of a Test Lead / Leader: i. Interaction with the Test Tool Vendor to identify best ways to leverage test tool on the project. ii. Write Test Summary Reports based on the ... is true and ii,iii,iv are false d) iii and iv is correct and i and ii are incorrect
Last Answer : a) i, ii, iii is true and iv is false
Description : State which of the one is false A. In performance testing, usage of tool is a must B. In database testing, database knowledge is a must. C. In Functional Testing, knowledge of business logic is a must D. None of the above.
Last Answer : D. None of the above.
Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program
Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.
Description : Enlist factors considered for selecting a testing tool for test automation.
Last Answer : The following factors are important during tool selection: i. Assessment of the organization's maturity (e.g. readiness for change); ii. Identification of the areas within the organization where ... the tool is another important point to be considered while selecting and deploying the test tool.
Description : How do you instal the Tritton 4-USB Port Network Hub & Switch?
Last Answer : Simply plug into your network and share 4 USB ports.
Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine
Last Answer : a. socket
Description : The combination of an IP address and a port number is known as ................... (A) network number (B) socket address (C) subnet mask number (D) MAC address
Last Answer : (B) socket address
Description : A passive two port network is in a steady state. Compared to its input, the steady state output can never offer A) Higher voltage B) Lower impedance C) Greater power D) Better regulation
Last Answer : A passive two port network is in a steady state. Compared to its input, the steady state output can never offer Greater power
Description : Consider the following statement for a 2-port network 1. Z11 =Z22 2. h12 = h21 3.Y12 = -Y21 4.BC - AD = -1 then the network is reciprocal if and only if (A) 1 and 2 are correct (B) 2 and 3 are correct (C) 3 and 4 are correct (D) 4 alone is correct.
Last Answer : Consider the following statement for a 2-port network 1. Z11 =Z22 2. h12 = h21 3.Y12 = -Y21 4.BC - AD = -1 then the network is reciprocal if and only if (A) 1 and 2 are correct (B) 2 and 3 are correct (C) 3 and 4 are correct (D) 4 alone is correct.
Description : A two port network having a 6 dB loss will give (A) an output power which is one - quarter of the input power (B) an output power which is one - half of the input power (C) an output voltage which is 0.707 of the input voltage. (D) an output power which is 0.707 of the input power.
Last Answer : A two port network having a 6 dB loss will give an output power which is one - quarter of the input power
Description : A passive 2-port network is in a steady state, compared to its input, the steady state output can never offer (a) Higher voltage (b) Lower impedance (c) Greater power (d) Better regulation
Last Answer : A passive 2-port network is in a steady state, compared to its input, the steady state output can never offer Greater power
Description : Two port networks are connected in cascade. The parameters of the network are obtained by multiplying in individual
Last Answer : Two port networks are connected in cascade. The parameters of the network are obtained by multiplying in individual ABCD parameter matrix
Description : Which of the following are known as the short circuit parameters of a 2- port network? (A) Z- parameters. (B) H- parameters. (C) Y- parameters. (D) A,B,C,D, parameters.
Last Answer : Which of the following are known as the short circuit parameters of a 2- port network? (A) Z- parameters. (B) H- parameters. (C) Y- parameters. (D) A,B,C,D, parameters.
Description : For a two -port reciprocal network, the three transmission parameters are A = 4, B = 7 and C = 5. What is the value of D ? (a) 9.5 (b) 9.0 (c) 8.5 (d) 8.0
Last Answer : For a two -port reciprocal network, the three transmission parameters are A = 4, B = 7 and C = 5. What is the value of D ? (a) 9.5 (b) 9.0 (c) 8.5 (d) 8.0
Description : A Two-Port Network is said to be symmetrical when the following equalities hold good (A) Z11 = Z22 and Z12 = Z21 (B) Z11 = Z22 (C) Y12 = Y21 (D) Y11 = Y22 and Y12 = Y21
Last Answer : A Two-Port Network is said to be symmetrical when the following equalities hold good Z11 = Z22
Description : Which network monitoring tool do you use and why?
Last Answer : I usually connect to my home router to see incoming and outgoing traffic to and from my network, but theres alot of different tools for networking. cain and abel is a very powerful program which can be used for network monitoring and ip-tracing.
Description : The network diagram is the best tool for demonstrating: A. Schedule variances B. Resource requirements C. The sequence of project activities D. Schedule performance over time
Last Answer : C. The sequence of project activities
Description : When the new developed product concept is tested, the next immediate step is to A. develop market strategy B. develop a testing technique C. develop intermediaries D. develop logistic network
Last Answer : A. develop market strategy
Description : When the new developed product concept is tested, the next immediate step is to A.market strategy B.a testing technique C.intermediaries E.logistic network Answer : A
Last Answer : A.market strategy
Description : Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field
Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
Description : In a classful addressing, the IP addresses with 0 (zero) as network number: (A) refers to the current network (B) refers to broadcast on the local network (C) refers to broadcast on a distant network (D) refers to loopback testing
Last Answer : (A) refers to the current network
Description : What is Video Port ?
Last Answer : Video Port ( Video Port) The computer has a video input and output port for video in or out. Separate cards are used for almost all computers.
Description : What is Audio Port ?
Last Answer : : Audio Port ( Audio Port) Multimedia PC and microphone both types of ports are connected. There is an audio in or microphone part for audio in and audio out or speaker part for audio out. ... soundcard is not built-in, you have to install the soundcard separately where the required audio parts are.
Description : What is PS / 2 Port ?
Last Answer : : PS / 2 Port ( PS / 2 Port) This port connects the mouse to the computer via a thin electrical cable. However, this cable uses an 8-pin connector. In this method the mouse control circuit is built-in ... is 6 PIN FEMALE . On the other hand, the cable connector connected to the mouse is 6 PIN MALE .