Description : ___for ping sweeps and port scanning a) Sam Spade b) SuperScan c) NetScan d) NetCat
Last Answer : b) SuperScan
Description : Which of the following tool is used for Windows for network queries from DNS lookups to trace routes? A. Sam Spade B. SuperScan C. NetScan D. Netcat
Last Answer : A. Sam Spade
Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above
Last Answer : D)All of Above
Description : Which of the following tools is used for Networks Testing and port Scanning a) NetCat b) SuperScan c) NetScan d) All of Above
Last Answer : d) All of Above
Description : Which of the following tool is used for Network Testing and port Scanning______ A. NetCat B. SuperScan C. NetScan D. All of above
Last Answer : D. All of above
Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat
Last Answer : c. John the ripper
Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan
Last Answer : A. Netcat
Description : 6 NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan
Last Answer : A)Network Mapper
Description : NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan
Description : Which tool is used for ping sweeps and port scanning? A. Netcat B. SamSpade C. SuperScan D. All the above
Last Answer : C. SuperScan
Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware
Last Answer : d) Hardware
Description : Three playing cards in a row. Can you name them with these clues? There is a two to the right of a king. A diamond will be found to the left of a spade. An ace is to the left of a heart. A heart is to the left of a spade. Now, identify all three cards. -Riddles
Last Answer : Ace of Diamonds, King of Hearts, Two of Spades.
Description : The dictionary imports the shovel for both. Then how do you know which one?
Last Answer : I checked it too, but the spade is the spade and the shovel is according to the Google translator. Of course he may be writing nonsense.
Description : I already have a spade destroyed by stones and bumps. Do you think he will go babrousit?
Last Answer : If it's a quality spade, bring it to the blacksmith, it's a shame to just grind it.
Description : Is there a jack card that is also spade card?
Last Answer : There are four suits in a pack of 52 playing cards. Hearts, diamonds, spades and clubs. Each suit contain a Jack, so the answer is yes, there is a Jack of Spades.
Description : In SPADE system, how many PCM-encoded voice band channels are there? A. 800 B. 600 C. 300 D. 240
Last Answer : A. 800
Description : Find the probability of getting a spade. A. 1/26 B. 1/13 C. 1/52 D. 1/4
Last Answer : D. 1/4
Description : In spade farming for intercultural operation — is used a. Power operated instruments b. Manual labour c. Bullock power d. None of these
Last Answer : b. Manual labour
Description : What Is The Use Of Spade, Spectacle, And Blind?
Last Answer : SPADE- Give space between two flanges and give flow through the spade. SPECTACLE – Combination of SPADE and BLIND and both option done in one flange. BLIND – Used for close the line.
Description : Which of the following is not a hand tool? 1. Mould Board 2. Shorel 3. Spade 4. Mamaunty
Last Answer : ans 1
Description : is not a hand tool. A. Mould board. B. Shovel C. Spade D. Mamounty
Last Answer : Mould board
Description : Following is not a hand tool A. Mould board C. Shovel B. Spade D. Momaunty
Description : Drivers are also known as: i. Spade ii. Test harness iii. Scaffolding a) i , ii are true and iii is false b) i , iii are true and ii is false
Last Answer : c) ii , iii are true and i is false
Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555
Last Answer : a. 65535
Description : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above
Last Answer : d. All of the above
Last Answer : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above
Description : What is a scanning device ?
Last Answer : Scanning devices are devices that can be used to translate texts , images , photos, etc. into digital form and store and process them on a computer.
Description : Which involves photo scanning of the text character by character, analysis of the scanned in image , and then translation of the character image into character code? A. OCR B. OMR C. Bar code Reader D. None of the Above
Last Answer : A. OCR
Description : The rate at which scanning is repeated in a CRT is called ________ A. Resolution B. Refresh rate C. Bandwidth D. None of the Above
Last Answer : B. Refresh rate
Description : What are Macros: a) Small add - on programs that are installed afterwards if you need them b) Small programs created in MS - Word to automate repetitive tasks by using VBA c) Automatic Virus Scanning Programs d) None of The Above
Last Answer : b) Small programs created in MS - Word to automate repetitive tasks by using VBA
Description : ______is used for scanning the pictures and putting them in digitized form in the computer: a) CD-ROM b) Plotter c) Scanner d) None of The Above
Last Answer : c) Scanner
Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation
Last Answer : 3) Scanning automation
Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation
Last Answer : 3 Scanning automation
Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning
Last Answer : D. Reconnaissance
Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these
Last Answer : b. Weakness
Description : What is the first phase of hacking? Maintaining access Gaining access Reconnaissance Scanning
Last Answer : Scanning
Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning
Last Answer : e. Scanning
Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.
Last Answer : A. Maintaining Access.
Description : Vulnerability scanning in Ethical hacking finds_____. A. Strengths. B. Weakness. C. A &B D. None of these.
Last Answer : B. Weakness.
Description : The process of writing on an optical disc is called (1) Ripping (2) Fetching (3) Scanning (4) Burning
Last Answer : Burning
Description : The rate at which scanning is repeated in a CRT is called : (1) refresh rate (2) resolution (3) pitch (4) bandwidth
Last Answer : refresh rate
Description : A technique for producing animation in which one image changes into another is called (1) Embedding (2) Linking (3) Morphing (4) Scanning
Last Answer : Morphing
Description : Adaptive maintenance is a maintenance which ............. (A) Correct errors that were not discovered till testing phase. (B) is carried out to port the existing software to a new environment. (C) improves the system performance. (D) both (B) and (C)
Last Answer : (B) is carried out to port the existing software to a new environment.
Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing
Last Answer : C. White-box testing
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing
Last Answer : c. White-box testing