tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    33. The "black box testing" methodology enforces which kind of restriction?

    A. Only the external operation of a system is accessible to the tester.

    B. The internal operation of a system is only partly accessible to the tester.

    C. The internal operation of a system is completely known to the tester.

    D. Only the internal operation of a system is known to the tester.



    34. When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners. What proxy tool will help you find web vulnerabilities?

    A. Proxychains

    B. Burpsuite

    C. Dimitry

    D. Maskgen



    < Prev.Page             CEHv9 Home             Next page>