Login
Remember
Register
User SakshiSharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by SakshiSharma
0
votes
1
answer
Explain the layout of HTML?
asked
Oct 24, 2019
in
HTML
layout-html
html-layout
0
votes
1
answer
Is it possible to change the color of the bullet in HTML?
asked
Oct 24, 2019
in
HTML
html-bullet
bullet-color
change-the-color
0
votes
1
answer
Can you create a multi-colored text on a HTML web page?
asked
Oct 24, 2019
in
HTML
html-web-page
web-page
html-page
multi-colored-text
0
votes
1
answer
What is SSL ?
asked
Oct 22, 2019
in
Ethical Hacking
ssl
0
votes
1
answer
Differentiate Between a MAC and an IP Address?
asked
Oct 22, 2019
in
Ethical Hacking
mac-address
ip-address
0
votes
1
answer
What are the different types of spoofing?
asked
Oct 22, 2019
in
Ethical Hacking
types-of-spoofing
spoofing-types
0
votes
1
answer
What is meant by spoofing attack?
asked
Oct 22, 2019
in
Ethical Hacking
spoofing-attack
0
votes
1
answer
Which programming language is used for hacking?
asked
Oct 22, 2019
in
Ethical Hacking
programming-language
hacking-language
+1
vote
1
answer
What's a denial of service (DOS) attack
asked
Oct 22, 2019
in
Ethical Hacking
denial-of-service
0
votes
1
answer
What is SQL injection and its types?
asked
Oct 22, 2019
in
Ethical Hacking
sql-injection
0
votes
1
answer
What is Burp Suite?
asked
Oct 22, 2019
in
Ethical Hacking
burp-suite
0
votes
1
answer
Explain how you can stop your website getting hacked?
asked
Oct 22, 2019
in
Ethical Hacking
website-hack
0
votes
1
answer
What is MAC Flooding?
asked
Oct 22, 2019
in
Ethical Hacking
mac-flooding
0
votes
4
answers
What are the tools used for ethical hacking?
asked
Oct 22, 2019
in
Ethical Hacking
ethical-hacking-tools
0
votes
1
answer
What are the hacking stages?
asked
Oct 22, 2019
in
Ethical Hacking
hacking-stages
0
votes
1
answer
What is data leakage? How will you detect and prevent it?
asked
Oct 22, 2019
in
Ethical Hacking
data-leakage
0
votes
1
answer
What is a firewall?
asked
Oct 22, 2019
in
Ethical Hacking
what-is-firewall
firewall
+1
vote
1
answer
What is the difference between VA and PT?
asked
Oct 22, 2019
in
Ethical Hacking
va
pt
0
votes
2
answers
What is CIA Triangle?
asked
Oct 22, 2019
in
Ethical Hacking
cia-triangle
0
votes
1
answer
What is the difference between encryption and hashing?
asked
Oct 22, 2019
in
Ethical Hacking
#encryption
#hashing
0
votes
1
answer
What is network sniffing?
asked
Oct 22, 2019
in
Ethical Hacking
network-sniffing
0
votes
1
answer
What can an ethical hacker do?
asked
Oct 22, 2019
in
Ethical Hacking
ethical-hacker
0
votes
1
answer
Why is Python utilized for hacking?
asked
Oct 22, 2019
in
Ethical Hacking
#python
#use-of-python
python-use
0
votes
1
answer
Distinguish between phishing and spoofing?
asked
Oct 22, 2019
in
Ethical Hacking
#phishing
#spoofing
0
votes
2
answers
What is Network Enumeration?
asked
Oct 22, 2019
in
Ethical Hacking
network-enumeration
0
votes
3
answers
What is Cowpatty?
asked
Oct 22, 2019
in
Ethical Hacking
#cowpatty
0
votes
1
answer
What is Pharming and Defacement?
asked
Oct 22, 2019
in
Ethical Hacking
#pharming
#defacement
0
votes
1
answer
What do you mean by DOS (Denial of administration) assault?
asked
Oct 22, 2019
in
Ethical Hacking
denial-of-administration
0
votes
1
answer
What are the techniques utilized for foot printing?
asked
Oct 22, 2019
in
Ethical Hacking
ethical-hacking-techniques
0
votes
1
answer
What do you understand by footprinting in ethical hacking?
asked
Oct 22, 2019
in
Ethical Hacking
ethical-hacking-footprints
ethical-hacking
Page:
« prev
1
...
206
207
208
209
210
211
212
213
214
215
216
...
221
next »
...