tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    65. Using Windows CMD, how could an attacker list all the shares to which the current user context has access?

    A. NET VIEW

    B. NET CONFIG

    C. NET FILE

    D. NET USE



    66. Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

    A. Dsniff

    B. John the Ripper

    C. Nikto

    D. Snort



    < Prev.Page             CEHv9 Home             Next page>