. Banner grabbing is an example of what?
 Footprinting
 Active operating system fingerprinting
 Passive operating system fingerprinting
 Application analysis

1 Answer

Answer :

 Passive operating system fingerprinting

Related questions

Description : What is Banner Grabbing ? a. Act of capturing the information by banners b. Grabbing Information c. Information Sharing d. Sharing Information

Last Answer : a. Act of capturing the information by banners

Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies

Last Answer : a. White hat hacking

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies

Last Answer : (a) white hat hacking

Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies

Last Answer : A. White Hat Hacking

Description : Banner grabbing is often used for a) White hat hacking b) Black hat hacking c) Gray hat hacking d) Scepit Kiddies

Last Answer : a) White hat hacking

Description : . . Hacking for a cause is called ..................  Hacktivism  Black-hat hacking  Active hacking  Activism

Last Answer :  Hacktivism

Description : Compare active transducer with passive transducer based on working principle, example, advantage, application

Last Answer : Compare active transducer with passive transducer based on working principle, example, advantage, application

Description : DNA fingerprinting refer to (a) molecular analysis of profiles of DNA samples (b) analysis of DNA samples using imprinting devices (c) techniques used for molecular analysis of different specimens of DNA (d) techniques used for identification of fingerprints of individuals.

Last Answer : (a) molecular analysis of profiles of DNA samples

Description : Which of the following is not required for any of the techniques of DNA fingerprinting available at present? (a) Restriction enzymes (b) DNA-DNA hybridisation (c) Polymerase chain reaction (d) Zinc finger analysis

Last Answer : (d) Zinc finger analysis

Description : Explain the application of DNA fingerprinting. -Biology

Last Answer : answer:

Description : Mention any four application of DNA fingerprinting -Science

Last Answer : answer:

Description : . What port number does HTTPS use?  53  443  80  21

Last Answer :  443

Description : Which are the four regional Internet registries?  APNIC, MOSTNIC, ARIN, RIPE NCC  APNIC, PICNIC, NANIC, ARIN  APNIC, PICNIC, NANIC, RIPE NCC  APNIC, LACNIC, ARIN, RIPE NCC

Last Answer :  APNIC, LACNIC, ARIN, RIPE NCC

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : What is the first phase of hacking?  Maintaining access  Gaining access  Reconnaissance  Scanning

Last Answer :  Scanning

Description : what is the primary goal of an Ethical Hacker ?  Avoiding detection  Testing security controls  Resolving security vulnerabilities  Determining return on investment for security measures

Last Answer :  Resolving security vulnerabilities

Description : What are the forms of password cracking techniques?  AttackSyllable  AttackBrute Forcing  AttacksHybrid  All of the above

Last Answer :  All of the above

Description : What is the attack called “evil twin”?  Rogue access point  ARP poisoning  Session hijacking  MAC spoofing

Last Answer :  MAC spoofing

Description : A Hybrid Bayesian network contains  Both discrete and continuous variables  Only Discontinuous variable  Both Discrete and Discontinuous variable  Continous variable only.

Last Answer :  Both Discrete and Discontinuous variable

Description : Which is not a property of representation of knowledge?  Inferential Adequacy  Representational Adequacy  Representational Verification  Inferential Efficiency

Last Answer :  Representational Adequacy

Description : Identify the wrong statement with reference to immunity. (a) When exposed to antigen (living or dead) antibodies are produced in the host's body. It is called Active immunity . (b) When ... full response. (d) Fetus receives some antibodies from mother, it is an example for passive immunity

Last Answer : c) Active immunity is quick and gives full response.

Description : Exposure to the flu virus, contracting the flu, and recovering from the disease would be an example of a. Artificially acquired passive immunity. b. Naturally acquired active immunity. c. Artificially acquired active immunity. d. Naturally acquired passive immunity.

Last Answer : b. Naturally acquired active immunity.

Description : Sodium ions are "pumped" from a region of lower concentration to a region of higher concentration in the nerve cells of humans. This process is an example of (A) Diffusion (B) Passive transport (C) Osmosis (D) Active transport

Last Answer : (D) Active transport

Description : The sensor that sends out sound pulses called pings, then receives the returning sound echo is called A : Active Sonar B : Passive Sonar C : Radar D : Laser Rangefinder

Last Answer : A : Active Sonar

Description : The sensor that receive sound echoes without transmitting their own sound signals is called A : Active Sonar B : Passive Sonar C : Radar D : Laser Rangefinder

Last Answer : B : Passive Sonar

Description : The sensor that sends out sound pulses called pings, then receives thereturning sound echo is called A : Active Sonar B : Passive Sonar C : Radar D : Laser Rangefinder

Last Answer : A : Active Sonar

Description : The sensor that sends out sound pulses called pings, then receives the returning sound echo is called A : Active Sonar B : Passive Sonar C : Radar D : Laser Rangefinder

Last Answer : A : Active Sonar

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing

Last Answer : c. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing

Last Answer : C. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing

Last Answer : C. White-box testing

Description : Discuss the role of the HUB. Differentiate between Active Hub and Passive Hub.

Last Answer : HUB: Hub is a connecting device; it is also known as multiport repeater. It is normally used for connecting stations in a physical star topology All networks require a central location to bring media segments ... . They are much expensive than passive hubs. 4. They are not much expensive.

Description : WHEN THE HEADLINE JUST INDICATE THE TYPE OF THE EVENT THAT IS CALLED....a) Label headline b) Banner Headline c) Active Headline d) None of the above

Last Answer : a) Label headline

Description : Do you agree with this council member and his lawyer that the act of grabbing this woman was just a "joke," and people are make a big to-do about nothing?

Last Answer : it's assault, plain and simple. People who call it ridiculous political correctness have no concept of the level of discomfort (read: a certain amount of pain) that these actions cause. Bruising and ... that do this kind of thing would never dream of doing the same thing to dogs or children.

Description : Why is it that men openly adjusting/grabbing themselves in public is socially acceptable?

Last Answer : Got me swinging. That’s why I don’t watch it. Men, anyway. I have no problem with a woman adjusting herself.

Description : If you are beset by hordes of chiggers, and are itching like mad, would grabbing a live spark plug wire on a lawn mower kill the suckers?

Last Answer : WTF is a chigger?

Description : With pointed fangs I sit and wait; with piercing force I crunch out fate; grabbing victims, proclaiming might; physically joining with a single bite. What am I? -Riddles

Last Answer : I am a Stapler.

Description : Write short note on the followings.  Hardware Engineer:

Last Answer :  Hardware Engineer:  He is a person who design and manufacture computer hardware.  He also do repairing and maintenance of computers.  He has deep knowledge of computers, processors, circuit ... images and videos using various software.  He can edit, split and combine images and videos. 

Description : What type of autoland system would be required for the landing to continue following a single failure below alert height? a. Fail soft b. Fail passive c. Fail operational or fail active d. Land 2 system

Last Answer : c. Fail operational or fail active

Description : What type of autoland system would be required for the landing to continue following a single failure below alert height? a. Fail soft b. Fail passive c. Fail operational or fail active d. Land 2 system

Last Answer : D. All of the above

Description : Differentiate between active system and passive system of remote sensing.

Last Answer : Sr.No. Active System Passive System 1 In this system man made resources of energy are used. In this system natural sources of are used. 2 The electromagnetic waves ... . This system is limitedly useful in land use and land cover analysis and small scale mapping.

Description : How can I present my idea of fingerprinting anti-theft software to Nokia?Any suggestion? Anyone to help me making that kind of software?

Last Answer : answer:They’re already on it. http://www.engadget.com/2007/12/03/nokia-envisions-fingerprint-reading-cellphone-displays/

Description : What is DNA fingerprinting? -Biology

Last Answer : answer:

Description : Why are restriction enzymes used for DNA fingerprinting? -Biology

Last Answer : answer:

Description : Where can I locate fingerprinting services online?

Last Answer : There are limited resources online for fingerpriting services. However, the best one I have found available is from Cogent Applicant Fingerprint fingerprinting in orange co.

Description : What is DNA fingerprinting? Enlist their uses.

Last Answer : It is well known fact that every individual has unique fingerprints. These occur at the tips of the fingers and have been used for identification for a long time. But these can be altered by surgery ... the DNA's of parent or children. d) To identify racial groups to rewrite biological evolution. 

Description : PCR and restriction fragment length polymorphism are the methods for (a) study of enzymes (b) genetic transformation (c) DNA sequencing (d) genetic fingerprinting.

Last Answer : (d) genetic fingerprinting.

Description : Biolistics (gene-gun) is suitable for (a) disarming pathogen vectors (b) transformation of plant cells (c) constructing recombinant DNA by joining with vectors (d) DNA fingerprinting.

Last Answer : (b) transformation of plant cells

Description : One of the most frequently used techniques in DNA fingerprinting is (a) VNTR (b) SSCP (c) SCAR (d) AFLP.

Last Answer : (a) VNTR

Description : The VNTRs in DNA fingerprinting stand for a. Versatile New Tandem Rearrangement b. Various Number of Transverse Repeat c. Variable New Transvers Regions d. Variable Number of Tandem Repeats

Last Answer : d. Variable Number of Tandem Repeats