Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    39. Which of the following is not a Bluetooth attack

    A. Bluejacking


    C. Bluesnarfing


    40. This asymmetry cipher is based on factoring the product of two large prime numbers.

    What cipher is described above?

    A. RC5

    B. SHA

    C. MD5

    D. RSA

    < Prev.Page             CEHv9 Home             Next page>