Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    91. Which method of password cracking takes the most time and effort

    A. Rainbow tables

    B. Shoulder suable

    C. Brute force

    D. Dictionary attack

    92. Under the "Post-attack Phase and Activities," it is the responsibility of the tester to restore the systems to a pre-test state. Which of the following activities should not be included in this phase? I. Removing all files uploaded on the system II. Cleaning all registry entries III. Mapping of network state N. Removing all tools and maintaining backdoor for reporting

    A. III

    B. IV

    C. III and IV

    D. All should be included

    < Prev.Page             CEHv9 Home             Next page>