Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack
Last Answer : d. SQL Injection attack
Description : What is Banner Grabbing ? a. Act of capturing the information by banners b. Grabbing Information c. Information Sharing d. Sharing Information
Last Answer : a. Act of capturing the information by banners
Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Description : . Banner grabbing is an example of what? Footprinting Active operating system fingerprinting Passive operating system fingerprinting Application analysis
Last Answer : Passive operating system fingerprinting
Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies
Last Answer : (a) white hat hacking
Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies
Last Answer : A. White Hat Hacking
Description : With pointed fangs I sit and wait; with piercing force I crunch out fate; grabbing victims, proclaiming might; physically joining with a single bite. What am I? -Riddles
Last Answer : I am a Stapler.
Description : Banner grabbing is often used for a) White hat hacking b) Black hat hacking c) Gray hat hacking d) Scepit Kiddies
Last Answer : a) White hat hacking
Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above
Last Answer : A)Attachment Overloading Attack
Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above
Last Answer : B. Auto responder Attack
Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : C) cookie
Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner
Last Answer : d. Banner
Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack
Last Answer : (B) Replay Attack
Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack
Last Answer : (A) Denial of service attack
Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off
Last Answer : c. To overload a system so it is no longer operational
Description : Which method will a web browser call on a new applet? A) main method B) destroy method C) execute method D) init method
Last Answer : D) init method
Description : The software that allows users to surf the Internet is called a/an _____: a) Search Engine b) Internet Service Provider c) Multimedia Application d) Browser e) Internet Surfing Provider
Last Answer : d) Browser
Description : What is the name of the software that allows us to browse through web pages called ? 1) Browser 2) Mail Client 3) FTP Client 4) Messenger
Last Answer : 1) Browser
Description : What is the name of the software that allows us to browse through web pages called ? 1 Browser 2 Mail Client 3 FTP Client 4 Messenger
Last Answer : 1 Browser
Description : A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : D) transkie
Description : Anxiety and panic attack victims, do you ever get the feeling that you will never get over it?
Last Answer : answer:I had them for a while about 20 years ago and deliberately found techniques to deal. Psychotherapy, some meds for a short time, meditation and yoga (and of course, the breathing).
Description : An email bomb is also known as a ___ a) Letter bomb b) Internet c) Banner d) Attack
Last Answer : a) Letter bomb
Description : Debugger is a program that (A) allows to examine and modify the contents of registers (B) does not allow execution of a segment of program (C) allows to set breakpoints, execute a segment of program and display contents of register (D) All of the above
Last Answer : (C) allows to set breakpoints, execute a segment of program and display contents of register
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : What is the best way to fix an XSS problem in a website?
Last Answer : Generally speaking, you scrub all input from users and escape it everywhere it might be displayed. Without more details I can’t give a more detailed answer.
Description : During the installation of SAP XSS you have to select the Usage Types that should be installedWhich Usage Types are necessary for the installation of SAP XSS? Note: there are 2 correct answered ... . Utilities Customer E-Services B. Enterprise Portal C. Adobe Document Services D. Self Services
Last Answer : D. Self Services
Description : Cross Site Scripting is also shortly khown as a) XSS b) HTTP c) HTTPS d) DNS
Last Answer : a) XSS
Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B
Last Answer : A)Attacker and victim and the crime scene
Description : In Computer intrusions the attacker will be leave multiple traces of there presence in: A)File System B)Registry C)System Logs D)All of the Above
Last Answer : D)All of the Above
Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information
Last Answer : a. Attacker and victim and the crime scene
Description : The digital evidence is used to establish the credible link between … a. System, evidence and victim b. Attacker, victim, and crime scene c. Attacker, victim and case file d. Attacker, system and victim
Last Answer : b. Attacker, victim, and crime scene
Description : The digital avoidance are use to stablish a credible link between (a) Attacker and victim and crime scene (b) Attacker and the crime scene (c) Victim and crime scene (d) Attacker and information.
Last Answer : (c) Victim and crime scene
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol
Last Answer : A) SSL handshake protocol
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Last Answer : C) 443
Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : C) SSL record protocol
Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC
Last Answer : Modem
Description : Do you agree with this council member and his lawyer that the act of grabbing this woman was just a "joke," and people are make a big to-do about nothing?
Last Answer : it's assault, plain and simple. People who call it ridiculous political correctness have no concept of the level of discomfort (read: a certain amount of pain) that these actions cause. Bruising and ... that do this kind of thing would never dream of doing the same thing to dogs or children.
Description : Why is it that men openly adjusting/grabbing themselves in public is socially acceptable?
Last Answer : Got me swinging. That’s why I don’t watch it. Men, anyway. I have no problem with a woman adjusting herself.
Description : If you are beset by hordes of chiggers, and are itching like mad, would grabbing a live spark plug wire on a lawn mower kill the suckers?
Last Answer : WTF is a chigger?
Description : Which among the following characteristics are correct about 'Cyberstalking': a) Cyberstalking is the use of the internet or electronics to stalk or harass an individual or any group. b) It includes making harassing phone ... ) It may be offline as well as online d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : Which journalist worked at Sinclair and was fired, for not just reading scripts and is on a media tour?
Last Answer : I haven’t heard that she’s on a media tour; but the only name that comes to my mind is Randy Lubratich who was fired earlier this year. I’m sure that with Sinclair’s reputation that there are probably others; but Randy is the only one that pops into my head.
Description : Could anyone help me find relaxation/hypnosis scripts?
Last Answer : YouTube
Description : Is it possible to store PHP scripts in the cloud?
Last Answer : answer:Yes Simplest example would be to grab the script from a service, stick it in a variable and eval it. Could you provide an example of why you’d want to? I can’t think of a good reason to do it offhand.
Description : What is the password for the BSA OA Vigil scripts?
Last Answer : answer:Are you talking about the password to access the information on their website? If so, this may be what you are looking for. “The password is the answer to Allowat’s Question in the Brotherhood Ceremony (again, in all lower case letters, no spaces, no quotes, no punctuation).” Source
Description : Does anyone know any good 2-3 minute monolouges, scripts, or from an original scene?
Last Answer : answer:There's a scene in Othello that might fit your description - right at the end, after Othello realises that he has killed Desdemona (his wife) by mistake'. Othello makes an incredibly ... when detatched from the rest of the play. Otherwise, try some other Shakespeare. King Lear perhaps?