Login
Remember
Register
User SakshiSharma
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by SakshiSharma
0
votes
Which AI technique enables the computers to understand the associations and relationships between objects and events?
answered
May 15, 2022
in
Artificial Intelligence
ai-technique
0
votes
The exploration problem is where______.
answered
May 15, 2022
in
Artificial Intelligence
exploration-problem
0
votes
In the Wumpus World Problem, the reason for the uncertainty is that the agent's sensor gives only__
answered
May 15, 2022
in
Artificial Intelligence
wumpus-world
0
votes
The search algorithm which is similar to the minimax search, but removes the branches that don't affect the final output is known as__.
answered
May 15, 2022
in
Artificial Intelligence
search-algorithm
0
votes
The maximum depth to which the alpha-beta pruning can be applied.
answered
May 15, 2022
in
Artificial Intelligence
ai-technique
0
votes
Among the given options, which is also known as inference rule?
answered
May 15, 2022
in
Artificial Intelligence
inference-rule
0
votes
Which of the following option is used to build complex sentences in knowledge representation?
answered
May 15, 2022
in
Artificial Intelligence
ai-technique
0
votes
Automatic Reasoning tool is used in_____.
answered
May 15, 2022
in
Artificial Intelligence
automatic-reasoning
0
votes
If according to the hypothesis, the result should be positive, but in fact it is negative, then it is known as_______.
answered
May 15, 2022
in
Artificial Intelligence
false-negative
0
votes
A hybrid Bayesian Network consist_____.
answered
May 15, 2022
in
Artificial Intelligence
bayesian-network
0
votes
The process of capturing the inference process as Single Inference Rule is known as:
answered
May 15, 2022
in
Artificial Intelligence
single-inference
0
votes
Which of the following can execute all the possible combination of attacks?
answered
Apr 16, 2022
in
Cyber Security
attacks
cyber-attacks
cyber-security
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Spidering is also known as ____________.
answered
Apr 16, 2022
in
Burp Suite
spidering
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Which of the following intruder attack uses a single payload set by enumerating all the parameters in a single request using the same payload?
answered
Apr 16, 2022
in
Burp Suite
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Which of the following intruder attack uses single payload sets?
answered
Apr 16, 2022
in
Burp Suite
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
You can check the response in Intercept tab.
answered
Apr 16, 2022
in
Cyber Security
intercept-tab
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Intercept can be used to change a request body.
answered
Apr 16, 2022
in
Burp Suite
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
If there are five payloads with three parameters each, how many requests will a sniper make?
answered
Apr 16, 2022
in
Burp Suite
payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Which of the following is used to automatically identify flaws?
answered
Apr 16, 2022
in
Burp Suite
identify-flaws
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Under which subtab of the Proxy tab are proxy details configured to be the same as the browser proxy, so that both request and response can be captured?
answered
Apr 16, 2022
in
Burp Suite
proxy-tab
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
Page:
« prev
1
...
77
78
79
80
81
82
83
84
85
86
87
...
382
next »
...