-
HOW TO ADD TAGS IN YouTube VIDEOS GET IN RECOMENDED YOUR VIDEO
Deepak Gautam April 28, 2020 2
GET YOUR VIDEOS IN RECOMMENDED FOLLOWING STEPS TO UPLOAD YOUR...
READ MOREHOW TO ADD TAGS IN YouTube VIDEOS GET IN RECOMENDED YOUR VIDEO
Deepak Gautam
April 28, 2020
-
artificial intelligence , Robotics
Artificial Intelligence
Deepak Gautam April 24, 2020 1
A RTIFICIAL INTELLIGENCE on that very rapidly increase as we see our phone search engines like google by it's very easier to the tas...
READ MOREArtificial Intelligence
Deepak Gautam
April 24, 2020
Subscribe to:
Comments
(
Atom
)
Copyright © 2019 SCIFI CURIOSITY
Featured
CSS Quiz 8 AKTU Prutor
Q:1. Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....
Tags
Recommended Posts
randomposts
Trending This Week
Q1) The storm botnet was mainly used for _______ ? Phishing ->D-Dos Attack Hacking None of the above Reason : The storm botnet was mainly used for Spamming. Q2) Which statement is incorrect for silent banker ? It is a trojan horse It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker ->Both A and B None of the above Reason The statement is incorrect for silent banker is Option ( c ) Both A and B. Q3) Which of the following is true for Stuxnet? It is a virus It is A botnet ->It is a computer worm A ransomware Reason : Stuxnet is a malicious computer worm first uncovered in 2010. Q4) Which of the following is incorrect for the attack on Target Corporation? It is an example of server-side attack More than 140 million credit card information was stolen in the attack ->The attack happened in 2011 None of the above Reason: The attack happened in 2011' is an incorrect ...
CSS quiz 4 aktu
Q:1. If we talk about control hijacking, which of the following is true ? 1. In Buffer overflow attacks, stack based attacks are more common than heap based attack. 2.-> Integer overflow attacks is not a type of control hijacking. 3. Format string vulnerabilities are used to prevent control hijacking. 4. All of the above Reason : I nteger overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold. Q:2. If we mark the stack and heap segement as non executable, 1. No code will execute. 2. return-oriented programming will also not be able to exploit it. 3.-> we can prevent overflow code execution. 4. All of the above. Reason : If we mark the stack and heap segement as non executable, we can prevent overflow code execution. because Overflow code execution can be prevented by marking the stack and heap segments as non-executable . Q:3. ...