questions/cyber-security-&-ethical-hacking
To find host name from IP you ...READ MORE
1. Open the Command Prompt. a. Click the Start icon, ...READ MORE
Some legitimate websites use obfuscation techniques, even ...READ MORE
There’s often confusion between obfuscation and encryption. ...READ MORE
I’ve noticed that encoding and encryption are ...READ MORE
When adding a mailto link to a ...READ MORE
XOR (exclusive OR) seems to be a ...READ MORE
Key-loggers pose a significant threat to secure ...READ MORE
Data obfuscation is often used to enhance ...READ MORE
I need to include a key in ...READ MORE
With protocol obfuscation, is it theoretically possible ...READ MORE
I’ve come across the term “collision resistance” ...READ MORE
Hashing and masking are often mentioned in ...READ MORE
Are there any hashing algorithms currently in ...READ MORE
In Free and Open-Source Software (FOSS), is ...READ MORE
When a browser establishes an HTTPS connection, ...READ MORE
When creating a Certificate Signing Request (CSR), ...READ MORE
When sending an HTTP Authorization header over ...READ MORE
I’ve seen code obfuscation used to make ...READ MORE
I’m trying to decide which SSH key ...READ MORE
In peer-to-peer systems, if an identity is ...READ MORE
When an SSL certificate expires and is ...READ MORE
If a website’s SSL certificate expires, what ...READ MORE
Between RSA and DSS (DSA) keys for ...READ MORE
With SSH, various algorithms and configurations are ...READ MORE
SSH public key authentication is often recommended ...READ MORE
In Nmap, the SYN scan (-sS) is ...READ MORE
Detecting and securing vulnerable open ports and ...READ MORE
An open port on a firewall without ...READ MORE
When Nmap fails to detect open ports ...READ MORE
Yes, it is possible to identify services ...READ MORE
Securing Windows services that require open ports ...READ MORE
When Nmap reports a port as open, ...READ MORE
Security controls are essential measures implemented to ...READ MORE
Conducting a comprehensive risk assessment in information ...READ MORE
Binding a server to localhost (127.0.0.1) is ...READ MORE
In information security, controls are commonly categorized ...READ MORE
An IP address conflict occurs when two ...READ MORE
Renaming files or changing their extensions to ...READ MORE
In programming and systems design, control flow ...READ MORE
Scanning for SSL services on non-standard ports ...READ MORE
In information security, overlapping controls, where a ...READ MORE
If a TCP port is open and ...READ MORE
I’ve been looking at an SSL/TLS certificate ...READ MORE
I’ve been running Nmap scans, and I’ve ...READ MORE
Is it possible to have multiple private ...READ MORE
If I generate a private key, will ...READ MORE
I’ve heard mixed opinions about blocking or ...READ MORE
I’m trying to check if a specific ...READ MORE
True or False: Nmap can be used ...READ MORE
OR
At least 1 upper-case and 1 lower-case letter
Minimum 8 characters and Maximum 50 characters
Already have an account? Sign in.