Professional Documents
Culture Documents
A - %f *
B - %lf
C - %Lf
D - None of the above
2. Which operator is used to continue the definition of macro in the next line?
A - #
B - ##
C - $
D-/ *
Simplex
Half Duplex
Full Duplex
Double Duplex *
a. Firewall *
b. Gateway
c. Router
d. Virus checker
a. Star
b. Ring
c. Bus
d. Peer to Peer *
a. 32 bits
b. 64 bits
c. 128 bits *
d. 256 bits
9.ThefirstNetworkwascalled________
a)CNNET
b)NSFNET
c)ASAPNET
d) ARPANET *
A. Pre-attack *
B. Attack
C. Post-attack
D. Reconnaissance
A. MAC Spoofing
B. ARP poisoning
D. Session hijacking
B. Airerack
C. Kismet *
D. Netsniff
A. SSID stealth
B. SSID unicast
C. SSID cloaking *
D. SSID Sec
A. //
B. /* Comment */
C. // Comment //
D. <!-- Comment --> *
A. <p> *
B. <pre>
C. <panel>
D. None of the above
a. True
b. False *
c. Neither False nor True
d. Cannot Determine
a. Ledger
b. Wallet
c. Certificate authority *
d. Hash