Home > Science
Ethical Hacking - 17

Certified Ethical Hacker Examination-Questions & Answers- #17

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 17th part Click here to Read Part-16 1- Which of the following is a command line packet analyzer similar to GUI-based Wireshark? A. tcpdump B. nessus C. etherea D. Jack the ripper #one{ width: 70%; padding: 25px 0; text-align: center;

Read More
gkaim.com

Aptitude Questions and Answers # 3

1- Union Information and Broadcasting ministry recently gave an indication to change which of the following laws on a larger scale, as the existing provisions of the Act are inadequate to cater to the phenomenal growth of the print media in view of the liberalization of the government policies? 1. Press & Registration of Books Act, (PRB Act) 1867 2. The Delivery Of Books ‘And Newspapers’ (Public Libraries) Act, 1954

Read More
gkaim.com

Aptitude Questions and Answers # 2

1- The average between a two digit number and the number obtained by interchanging the digits is 9. What is the difference between the two digits of the number? 1. 8 2. 2 3. 5 4. Cannot be determined #one{ width: 70%; padding: 25px 0; text-align: center; background-color: lightgreen; margin-top: 10px; display:none; } VIEW

Read More
Computer Networking-CCNA (gkaim)

Computer Networking #5 -Questions and Answers

Computer Networking #5 -Questions and Answers Today Question => What is a Network Protocol ? A network protocol can be viewed as a common network communication standard, which is used to define a method of exchanging data over a computer network. Network protocol define rules and conventions for communication between different devices, participating in a computer network. Almost all protocols used in the Internet are common standards defined by RFC (Request for Comments). Examples

Read More