SATAN stands for_
a. Security Advanced Tool for Analysis Networks
b. Security Admin Tool for Analysis Networks
c. Security Administrator Tool for Analysis Networks
d. Security Administrator Tool for Analysing Network

1 Answer

Answer :

c. Security Administrator Tool for Analysis Networks

Related questions

Description : ARPANET stands for: a) American Research Project Agency Network b) Advanced Research Project Agency Network c) Admissible Research Project Agency Networking d) None of Thesse

Last Answer : b) Advanced Research Project Agency Network

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : The most widely used method for analysing the performance of a marketing strategy isA)cost analysis. B)sales analysis. C)distribution analysis. D)promotional analysis. E)target market analysis

Last Answer : B)sales analysis.

Description : ...................... is a method of analysing the current movement of the some variable in an effort to predict the future movement of the same variable. a. Goal programming b. Queuing theory c. Markov Analysis d. Replacement theory

Last Answer : c. Markov Analysis

Description : function is used to transfer the control to end of a program which uses one argument( ) and takes value is zero for_ __ termination and non-zero for _termination: a. _ Exit( ) normal, abnormal b. Break, normal, abnormal Botha & b None of these

Last Answer : a. _ Exit( ) normal, abnormal

Description :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be A) 3 B) 2 C) 4 D) 5 

Last Answer :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be 3 

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : SATA stands for: a) Super Advanced Technology Attachment b) Serial Advanced Technology Attachment c) Special Access Technology Attachment d) None of These

Last Answer : b) Serial Advanced Technology Attachment

Description : Which tool allows a user to simulate real networks? a.artificial intelligence b.Packet Tracer c.internet d.PAN

Last Answer : b.Packet Tracer

Description : Role of Social Media Executive is….. 1. Content Marketing 2. Admin 3. Strategy 4. Analysis

Last Answer : Admin

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : The agency which is tasked with collecting analysing and disseminating information related to dubious financial transactions is ________ A. Financial Intelligence Unit(FIU) B. Financial Action Task Force( ... Bureau(CEIB) D. Central Intelligence Bureau(CIB) E. Financial Stability Board(FSB)

Last Answer : A. Financial Intelligence Unit(FIU) Explanation: The Financial Intelligence Unit (FIU), an agency tasked with collecting, analysing and disseminating information related to ... appropriate, disseminate valuable financial information to intelligence/enforcement agencies and regulatory authorities.

Description : In Networks, WEP stands for (1) Wireless Equivalent Privacy (2) Wired Extra Privacy (3) Wired Equivalent Privacy (4) Wireless Embedded Privacy

Last Answer : Wired Equivalent Privacy

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : IT career: Network admin, Web programmer or App programmer?

Last Answer : If you want you earn much money, then dont choose IT career. if you still want IT career, you should know what you are good at.

Description : What does a network admin see when you use Google Reader?

Last Answer : If your address bar starts with this: https:// Then they will see the address you are visiting but not the content. SSL content is viewable though not easily. If you link to a proxy then they will ... bit of common sense before you go visiting something you don't want your co workers to know about.

Description : Are language skills instinctual, or are they an advanced tool instinct?

Last Answer : It's probably a little bit a both - but our brains are uniquely tuned for language/language development. Particular parts of the brain, when damaged, solely affect a person's ability to ... an individual will perceive themselves as speaking clearly, but the words they use are utterly nonsensical.

Description : CRT stands for: a) Compact Ray Tube b) Cathode Ray Tube c) Compatible Recognition Tool d) None of These

Last Answer : b) Cathode Ray Tube

Description : The most famous Recurrent Neural Network is _______ (A) Perceptrons (B) Radial Basis Networks (C) Hopfield net (D) None of the Above

Last Answer : (C) Hopfield net

Description : _________ is a computational model based on the structure of biological neural networks? (A) Artificial Neural Network (ANN) (B) Biological Network (C) Both(A) & (B) (D) None of the Above

Last Answer : (A) Artificial Neural Network (ANN)

Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These

Last Answer : a) A large Network of Networks

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1) Transport 2) Network 3) Presentation 4) Session

Last Answer : 2) Network

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session

Last Answer : 2 Network

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : A ____ is a high-speed network that connect local networks in a city or town. (1) LAN (2) MAN (3) WAN (4) TAN

Last Answer : MAN

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : I am doing a presentation on information technology (Network administrator) and I don't know what to do?

Last Answer : answer:Who are your audience? @jaytkay video on linked URL is no longer available

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : APD stands for: a. Avalanche Photodiode b. Advanced Photodiode c. Avalanche Photo Detector d. Advanced Photo Detector

Last Answer : a. Avalanche Photodiode

Description : AVR stands for_____________________. A. Advanced Virtual RISC. B. Alf-Egil Bogen and Vegard Wollan RISC C. Both A & B D. None of the above

Last Answer : C. Both A & B 

Description : ARM stands for _________ A. Advanced RISC Machine B. Advanced RISC Methodology C. Advanced Reduced Machine D. Advanced Reduced Methodology

Last Answer : A. Advanced RISC Machine 

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : _________ and _________ saves the publish and subscribe keys that we have generated with the PubNub Admin portal. a) public_key and subscribe_key b) Public-key and subscribe-key c) publickey and subscribekey d) Key_public and key_subscribe

Last Answer : a) public_key and subscribe_key

Description : A _________ is a decision support tool that uses a tree-like graph or model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility. a) Decision tree b) Graphs c) Trees d) Neural Networks

Last Answer : a) Decision tree

Description : RATS stands for: a) Regression Analysis Time Series b) Real Analysis Time Sharing c) Regression Analysis Series d) None of The Above

Last Answer : a) Regression Analysis Time Series

Description : How can you put advanced account security on windows 2000?

Last Answer : answer:They Public Access Computing Security Tool may work for you. It's the ancestor of Windows SteadyState, which works with XP and later http://www.webjunction.org/pc-protection/articles/content/ ... to your other computers, making it quick and easy to set up identical public access computers.

Description : How do activate VIPRE Advanced Security with retail card?

Last Answer : VIPRE est l'un des principaux fournisseurs de solutions de sécurité internet protégeant les entreprises, les fournisseurs de solutions et les utilisateurs à domicile contre les cybermenaces coûteuses et ... et des e-mails et une analyse en temps réel des logiciels malveillants.ly/QbXnfEB

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Do you ever find yourself analysing your spirituality, religious beliefs or lack of?

Last Answer : answer:I very often lament the fact that I lack comforting rituals. Even something as simple as crossing oneself when you're scared, or to center yourself before doing something uncomfortable, can be a ... study and evidence-gathering, and I've stopped holding my breath for new evidence of a deity.

Description : Is Satan "white"?

Last Answer : I’ve always thought he was red.