Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    31. Which of the following is a low-tech way of gaining unauthorized access to systems?

    A. Eavesdropping

    B. Scanning

    C. Social engineering

    D. Sniffing

    32.A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?

    A. Botnet Trojan

    B. Turtle Trojans

    C. Banking Trojans

    D. Ransomware Trojans

    < Prev.Page             CEHv9 Home             Next page>