Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    25. Which of the following tools can be used for passive OS fingerprinting?

    A. tracert

    B. tcpdump

    C. ping

    D. nmap

    26. What is the best description of SQL Injection?

    A. It is an attack used to gain unauthorized access to a database.

    B. It is an attack used to modify code in an application.

    C. It is a Denial of Service Attack.

    D. It is a Man-in-the-Middle attack between your SQL Server and Web App Server.

    < Prev.Page             CEHv9 Home             Next page>