Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    11. To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring to this type of testing?

    A. Randomizing

    B. Mutating

    C. Fuzzing

    D. Bounding

    12. You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through. invictusavictim_server-$ nmap -T4 -0 TCP/IP fingerprinting (for OS scan) xx.xxx x,00Docxxxxxxxxx. QUITTING! What seems to be wrong?

    A. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

    B. This is a common behavior for a corrupted nmap application.

    C. OS Scan requires root privileges.

    D. The nmap syntax is wrong.

    < Prev.Page             CEHv9 Home             Next page>