hi,i want to do the certification course in ethical hacking&
hacking....wats is the difference...can any one suggest the
good institutes.....wat r the fee particulars.....wat job
opportunitie will be there? thanks in advance
Answer Posted / s.m.feroz ahmed
Hi,
Ethical Hacking is something defined as think like an
Hacker and provide Counter measure to overcome hacking this
concept is called as Ethical Hacking and it covers Hacking
concept to within Ethical Hacking.Job oppurtunities
available in Ethical Hacking will be on Securities which is
a highly paid job.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Explain Salient difference between ISO-OSI and TCP/IP models.
what is scsi?. what we do if scsi/scsi drive failed?.
Differentiate between IEEE 802.3, IEEE 802.4 and IEEE 802.5 standards.
IN MY SYSTEM IAM USING VM WARE I INSTALLED 2003 SREVER AND TWO CLIENTS USING SAME 2003SERVER NOW I WOULD LIKE TO INSTALL EXCHANGE SREVER IN MY VM WARE IS IT POSSIBLE IF IT IS PLEASE SHOW ME A ROOT HOW CAN I
hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
What is Proxy ARP
What is passive topology
Discuss the different factors affecting congestion control algorithms. ?
what is Voltage levels of rs232x?
Define Enterprise Networks
Differentiate between Optical fibre and twisted pair
What is ISO-OSI reference model ? Compare it with TCP/IP reference model.
Explain Traffic shaping using token bucket algorithm
how to take backup of BIOS ?