Samir Thapa | Questions Samir Thapa1.27K QuestionsAnswersReputations 0 Votes 1 Ans What is traceroute? 42 viewsBibek Baniya Answered question 3 days agoBooksbest books 1 Votes 1 Ans What steps are taken to run Armitage on Kali Linux? 43 viewsBibek Baniya Answered question 3 days agoKali Linuxbest books 2 Votes 2 Ans Which platform is best for Metasploit, Linux, or Windows? 54 viewsBibek Baniya Answered question 7 days agoKali Linuxkali linux 3 Votes 3 Ans What are the pen-testing methodologies? 62 viewsBibek Baniya Answered question 7 days agoKali Linuxkali linux 3 Votes 3 Ans What grep command do? 59 viewsBibek Baniya Answered question 7 days agoKali Linuxkali linux 4 Votes 5 Ans How do computer viruses spread? 73 viewsKrishna Poudel Answered question January 15, 2025Bookscomputer 2 Votes 4 Ans What is the use of a Firewall? 70 viewsBibek Baniya Answered question January 15, 2025Kali Linuxkali linux 3 Votes 4 Ans What is Pivoting? 74 viewsBibek Baniya Answered question January 15, 2025Kali Linuxkali linux 2 Votes 3 Ans If you get a Database Error on Kali Linux, how do you fix it? 65 viewsBibek Baniya Answered question January 15, 2025Kali Linuxbest books 1 Votes 3 Ans What is the main purpose of a computer virus? 50 viewspraxantp Answered question January 14, 2025Bookscomputer 1 Votes 3 Ans What should I do if I receive a potentially infected message? 55 viewsKrishna Poudel Answered question January 14, 2025Bookscomputer 2 Votes 2 Ans How can we protect our computer from a virus? 44 viewsManish Ruchal Answered question January 13, 2025Bookscomputer 2 Votes 3 Ans What is the Diffie-Hellman public-key exchange? 68 viewspraxantp Answered question January 12, 2025Kali Linuxkali linux 3 Votes 4 Ans What is DDos attack? 76 viewspraxantp Answered question January 12, 2025Kali Linuxbest books 2 Votes 3 Ans What skills are important for an ethical hacker? 78 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 2 Ans What are some social engineering attacks? 63 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 2 Votes 3 Ans What’s footprinting? 79 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 3 Ans What are some challenges faced by ethical hackers? 80 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 2 Ans What’s the difference between ethical and malicious hacking? 62 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 2 Votes 2 Ans How do you use Nmap for network scanning in Kali Linux? 65 viewsRojan Adhikari Answered question January 7, 2025Kali Linuxbest books 2 Votes 2 Ans What is the most important command in Kali Linux? 63 viewsRojan Adhikari Answered question January 7, 2025Kali Linuxbest books 1 Votes 2 Ans How do you update tools in Kali Linux to their latest versions? 77 viewsRojan Adhikari Answered question January 7, 2025Kali Linuxkali linux 2 Votes 2 Ans How would you define Penetration Testing? 74 viewsRojan Adhikari Answered question January 7, 2025Booksbest books 2 Votes 2 Ans What is sniffing? 73 viewsRojan Adhikari Answered question January 7, 2025Booksbest books 2 Votes 2 Ans Explain The Concept Of Cross-site Scripting. 81 viewsRojan Adhikari Answered question January 7, 2025Booksbest books 1 Votes 1 Ans What constitutes the elements of Linux? 56 viewsManish Ruchal Answered question January 7, 2025Kali Linuxkali linux