Advertisement

Hacker Questions and Answers (Q&A)

W. Mocroft, Philanthropist
Answered: May 30, 2019
The answer to this question is C. This is a type of document that can provide information about the different methods that will make it possible to connect to a secure network. This is very...Read More

2 Answers

746 views
Barry Mclean, Sales Manager
Answered: Apr 03, 2019
Option A is the correct answer. Footprinting is the most important phase in ethical hacking as this is where an (ethical) hacker collects as much as information he or she could possibly get in...Read More

2 Answers

722 views
Fkowal
Answered: Dec 25, 2024
Malicious code is attempting to execute instruction in a non-executable memory region.

1 Answer

646 views
Fkowal
Answered: Dec 25, 2024
Bluesmaking

1 Answer

534 views
Fkowal
Answered: Dec 25, 2024
A blacklist of companies that have their mail server relays configured to be wide open.

1 Answer

414 views
Fkowal
Answered: Dec 25, 2024
Site: target.com filetype:xls username password email

1 Answer

396 views
Wooks
Answered: May 20, 2018
The best hackers in the world are ones who have been able to hack into the computers of the federal government and major retail outlets. They have been to cause all kinds of havoc doing things...Read More

2 Answers

353 views
John Smith
Answered: Dec 25, 2024
UDP is filtered by a gateway
The packet TTL value is too low and cannot reach the target
The host might be down
ICMP is filtered by a gateway

1 Answer

315 views
Corné , College student
Answered: Nov 03, 2020
Hacking is a work known in the world of computing and is defined as an act of discovering and exploiting systems and vulnerabilities of a network to obtain unauthorized access to the system....Read More

5 Answers

52 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.