IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Ethical HackerWhich domain name database query utility has been restricted by the European Union´s General Data Protection Regulation (GDPR) to protect privacy?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the definition of a library in application software?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language elements perform similar tasks?ITExamAnswers asked 10 months ago • Ethical HackerWhat kind of data structure in Python is represented in the example below? cves = [‘CVE-2022-0945’, ‘CVE-2023-1234’, ‘CVE-2022-0987’]ITExamAnswers asked 10 months ago • Ethical HackerWhich term describes a programming language component such as JavaScript Object Notation (JSON)?ITExamAnswers asked 10 months ago • Ethical HackerWhich programming language data structure is a special variable with more than one value at a time?ITExamAnswers asked 10 months ago • Ethical HackerWhat is the definition of a procedure used in an application software?ITExamAnswers asked 10 months ago • Ethical HackerWhich two items can be included in a library? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich two items are data structures used in programming languages? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhich two items are programming logic constructs? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerWhat are two exploitation frameworks? (Choose two.)ITExamAnswers asked 10 months ago • Ethical HackerAn attacker uses John the Ripper to crack a password file. The attacker issued the ~$ john –list=formats command in Kali Linux. Which information is the attacker trying to find?ITExamAnswers asked 10 months ago • Ethical HackerWhich three tools can be used to perform passive reconnaissance? (Choose three.)ITExamAnswers asked 10 months ago • Ethical HackerWhich statement describes the concept of Bash shell in operating systems?ITExamAnswers asked 10 months ago • Ethical HackerRefer to the exhibit. Which Python data structure is used?ITExamAnswers asked 10 months ago • Ethical Hacker