MCQOPTIONS
Bookmark
Saved Bookmarks
→
Cyber Security
→
Botnets
→
______________ comes under tools for reverse engin...
1.
______________ comes under tools for reverse engineering (RE).
A.
Reassembler
B.
Compiler
C.
Disassembler
D.
Interpreter
Answer» D. Interpreter
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
_____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.
Which one is not an example of .Net application decompiler?
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
There are __________ main types of spyware.
________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.
Session hijacking takes place at ____________ number of levels.
Which of the following example do not comes under network level session hijacking.
Which of the following is not a threat of web application?
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.
Which of the following is not a threat of web application ?
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies