Home > GENERAL KNOWLEDGE
Certified Ethical Hacking Examination Questions & Answers

Certified Ethical Hacker Examination-Questions & Answers- #8

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 8th part Click here to Read Part-7 1- You are using NMAP to resolve domain names into IP addresses for a ping sweep later.Which of the following commands looks for IP addresses? A. >host -t a hackeddomain.com B. >host -t soa hackeddomain.com C. >host -t ns hackeddomain.com D. >host -t AXFR hackeddomain.com #one{

Read More
Cyber Security Ethical Hacker-Q & A - gkaim

Certified Ethical Hacker Examination-Questions & Answers- #7

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 7th part Click here to Read Part-6 1- What tool should you use when you need to analyze extracted metadata from files you collected when you were in the initial stage of penetration test (information gathering)? A. Armitage (GUI that visualizes targets and recommends exploits) B. Dimitry (Deepmagic Information Gathering Tool) C.

Read More
gkaim.com

Aptitude Questions and Answers # 3

1- Union Information and Broadcasting ministry recently gave an indication to change which of the following laws on a larger scale, as the existing provisions of the Act are inadequate to cater to the phenomenal growth of the print media in view of the liberalization of the government policies? 1. Press & Registration of Books Act, (PRB Act) 1867 2. The Delivery Of Books ‘And Newspapers’ (Public Libraries) Act, 1954

Read More
gkaim.com

Aptitude Questions and Answers # 2

1- The average between a two digit number and the number obtained by interchanging the digits is 9. What is the difference between the two digits of the number? 1. 8 2. 2 3. 5 4. Cannot be determined #one{ width: 70%; padding: 25px 0; text-align: center; background-color: lightgreen; margin-top: 10px; display:none; } VIEW

Read More