1. A process is nothing but a running instance of a program. True or False? a. True b. False 2. Which of the following Linux commands is used to check files opened by…
Read moreAs you prepare for your pentester interview, you may be considering which questions the employer is going to ask you. While there’s no way to know for sure what topics will be covered…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 81: Explain the basic steps involved in converging a link state inter network. Answer: Each router floods a…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 61: What is a summary route? In the context of static routing, how are summary routes useful? Answer:…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 41: What is fragmentation? What fields of the IP header are used for fragmentation? Answer: Routers perform fragmentation…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 21: What is the primary purpose of a LAN? Answer: The primary purpose of a local-area network is…
Read morePart 1 | Part 2 | Part 3 | Part 4 | Part 5 Question 1: Which layer of the OSI model is responsible for reliable connections? Answer: The Transport layer of the…
Read more1. Device A has been configured for IRQ 3. Which of the following devices will Device A potentially conflict with? A. COM1 B. LPT1 C. COM2 D. LPT2 2. What is the default…
Read more1. Which of the following components is not usually found on a motherboard? A. Hard drive controller B. DVD drive controller C. Memory D. Video adapter 2. What type of memory is not…
Read moreComputers have become a ubiquitous part of our daily lives. Understanding computer basics is essential for anyone who uses a computer, whether it is for personal or professional use. By understanding the fundamental…
Read moreQuestion 142. Which of the following is often one of the most overlooked areas of security? A. Operational B. Technical C. Internet D. Physical Answer 142. Option D. Explanation: Physical security is one…
Read moreQuestion 95. What is the Ping of Death? A. Sending packets that, when reassembled, are too large for the system to understand B. Sending very large packets that cause a buffer overflow C….
Read moreQuestion 48. What is the process of hiding text within an image called? A. Steganography B. Encryption C. Spyware D. Keystroke logging Answer 48. Option A. Explanation: Steganography is the process of hiding…
Read moreQuestion 1. Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker Answer 1. Option A. Explanation: A white-hat…
Read more1. Which of the following types of memory is used for cache memory? A. SRAM B. DRAM C. EDO RAM D. SDRAM 2. How many bits make up the data path of a…
Read more1. You have a USB camera in which you are trying to copy some of the pictures to the computer’s hard disk. The computer does not seem to recognize the device. What should…
Read more1. What are the two types of paper feeder mechanisms? A. Continuous tractor feed B. Continuous form feed C. Friction feed D. Injected 2. What type of printer is most likely to use…
Read more1. What is the size of a sector on a hard disk? A. 512K B. 1K C. 512 bytes D. 4K 2. How many devices can exist in an IDE chain? A. 1…
Read more1. Which type of memory cannot be upgraded without replacing a CPU? A. RAM B. L1 cache C. L2 cache D. None of the above 2. Which type of the system BIOS can…
Read more1. What is the most popular category of portable PCs? A. Notebook B. Laptop C. Palmtop D. Suitcase computer 2. Which battery type is the best for a portable computer? A. Alkaline B….
Read more1. The correct voltages in the PSU are: A. +5 VDC, –5 VDC, +10 VDC, –10 VDC B. +5 VDC, –5 VDC, +11 VDC, –11 VDC C. +5 VDC, –5 VDC, +12 VDC,…
Read moreThis article presents various questions you’re likely to be asked by various employers when you interview for a job position after the completion of CEH(Certified Ethical Hacker). What is the difference between encoding,…
Read more