tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    23. When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation. What command will help you to search files using Google as a search engine?

    A. domain: target.com archive:xls username password email

    B. site: target.com filetype:xls usemame password email

    C. site: target.com file:xls username password email

    D. Mud: target.com filename:xls username password email



    24. Which of the following is an extremely common IDS evasion technique in the web world?

    A. unicode characters

    B. subnetting

    C. port knocking

    D. spyware



    < Prev.Page             CEHv9 Home             Next page>