Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    27. Which of the following is assured by the use of a hash

    A. Integrity

    B. Availability

    C. Confidentiality

    D. Authentication

    28. An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database. < /iframe> What is this type of attack (that can use either HTFP GET or HTTP POST) called?

    A. Cross-Site Scripting

    B. Browser Hacking

    C. Cross-Site Request Forgery

    D. SQL Injection

    < Prev.Page             CEHv9 Home             Next page>