Samir Thapa | Questions Samir Thapa1.27K QuestionsAnswersReputations 0 Votes 1 Ans What is traceroute? 74 viewsBibek Baniya Answered question January 19, 2025Booksbest books 1 Votes 1 Ans What steps are taken to run Armitage on Kali Linux? 79 viewsBibek Baniya Answered question January 19, 2025Kali Linuxbest books 2 Votes 2 Ans Which platform is best for Metasploit, Linux, or Windows? 100 viewsBibek Baniya Answered question January 16, 2025Kali Linuxkali linux 3 Votes 3 Ans What are the pen-testing methodologies? 110 viewsBibek Baniya Answered question January 16, 2025Kali Linuxkali linux 3 Votes 3 Ans What grep command do? 116 viewsBibek Baniya Answered question January 16, 2025Kali Linuxkali linux 4 Votes 5 Ans How do computer viruses spread? 149 viewsKrishna Poudel Answered question January 15, 2025Bookscomputer 2 Votes 4 Ans What is the use of a Firewall? 134 viewsBibek Baniya Answered question January 15, 2025Kali Linuxkali linux 3 Votes 4 Ans What is Pivoting? 128 viewsBibek Baniya Answered question January 15, 2025Kali Linuxkali linux 2 Votes 3 Ans If you get a Database Error on Kali Linux, how do you fix it? 118 viewsBibek Baniya Answered question January 15, 2025Kali Linuxbest books 1 Votes 3 Ans What is the main purpose of a computer virus? 113 viewspraxantp Answered question January 14, 2025Bookscomputer 1 Votes 3 Ans What should I do if I receive a potentially infected message? 108 viewsKrishna Poudel Answered question January 14, 2025Bookscomputer 2 Votes 2 Ans How can we protect our computer from a virus? 90 viewsManish Ruchal Answered question January 13, 2025Bookscomputer 2 Votes 3 Ans What is the Diffie-Hellman public-key exchange? 123 viewspraxantp Answered question January 12, 2025Kali Linuxkali linux 3 Votes 4 Ans What is DDos attack? 139 viewspraxantp Answered question January 12, 2025Kali Linuxbest books 2 Votes 3 Ans What skills are important for an ethical hacker? 121 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 2 Ans What are some social engineering attacks? 99 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 2 Votes 3 Ans What’s footprinting? 120 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 3 Ans What are some challenges faced by ethical hackers? 125 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 2 Ans What’s the difference between ethical and malicious hacking? 96 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 2 Votes 2 Ans How do you use Nmap for network scanning in Kali Linux? 105 viewsRojan Adhikari Answered question January 7, 2025Kali Linuxbest books 2 Votes 2 Ans What is the most important command in Kali Linux? 109 viewsRojan Adhikari Answered question January 7, 2025Kali Linuxbest books 1 Votes 2 Ans How do you update tools in Kali Linux to their latest versions? 111 viewsRojan Adhikari Answered question January 7, 2025Kali Linuxkali linux 2 Votes 2 Ans How would you define Penetration Testing? 109 viewsRojan Adhikari Answered question January 7, 2025Booksbest books 2 Votes 2 Ans What is sniffing? 105 viewsRojan Adhikari Answered question January 7, 2025Booksbest books 2 Votes 2 Ans Explain The Concept Of Cross-site Scripting. 112 viewsRojan Adhikari Answered question January 7, 2025Booksbest books 1 Votes 1 Ans What constitutes the elements of Linux? 93 viewsManish Ruchal Answered question January 7, 2025Kali Linuxkali linux