GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Explain how Google Dorks works and what is it used for?   Gi…

Explain how Google Dorks works and what is it used for?   Give an example of a Google Dork that would search only the site sam.com with the word admin in the URL and database in the title.   Is this search you provided an active or passive search, and explain why?

Read Details

A “stick tie” is another name for a tie on a passer.

A “stick tie” is another name for a tie on a passer.

Read Details

Surgical gut sutures have been known to cause significant in…

Surgical gut sutures have been known to cause significant inflammatory responses to wounds.

Read Details

Match words with the most correct answer. All answers will b…

Match words with the most correct answer. All answers will be used.

Read Details

Given the following network diagrams indicate the values in…

Given the following network diagrams indicate the values in the CAM and ARP Tables. a) Assume Host A just came online and its ARP table is empty. Show what it would look like after it had communicated first to the Server and then out to the internet.   b) Show what the CAM table would look like, when PC-A communicates with PC-B (assume the table was empty before this communications)   c) What is the main difference between a hub, switch, and router, also indicate how many collision domains each has.  

Read Details

Define the following terms and what information is acquired…

Define the following terms and what information is acquired using them: 1) whois 2) DNS 3) host 4) Nessus 5) nmap

Read Details

During the formation of a blood clot, thrombin reacts with f…

During the formation of a blood clot, thrombin reacts with fibrinogen to form fibrin.

Read Details

Describe the various types of port scans that are possible w…

Describe the various types of port scans that are possible with nmap (the name of the scan)   nmap -sT 192.168.1.1   :_________________________________   nmap -sS 192.168.1.1   :_________________________________   nmap -sA 192.168.1.1   :_________________________________   nmap -sN 192.168.1.1   :_________________________________   nmap -sX 192.168.1.1   :_________________________________   nmap -O 192.168.1.1    :_________________________________

Read Details

Show the steps (commands) you would take in using Metasploit…

Show the steps (commands) you would take in using Metasploit to open a reverse_tcp shell with meterpreter targeting an XP machine. (assume hacker IP ->192.168.1.200, victim IP ->192.168.1.100) Using exploit       windows/smb/ms08_067_netapi                   Using payload     windows/meterpreter/reverse_tcp  

Read Details

Which of the following are NOT members of the Big Three?

Which of the following are NOT members of the Big Three?

Read Details

Posts pagination

Newer posts 1 … 43,351 43,352 43,353 43,354 43,355 … 68,507 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top