Where possibilities begin

We’re a leading marketplace platform for learning and teaching online. Explore some of our most popular content and learn something new.
Total 835 Results
ComptiA Security+ Certification Exam Questions and answer - Part 28

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 28

Questions 1. An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review,the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO). Which of the following is the best NEXT step for the analyst to take?A) Call the CEO directly to ensure awareness of the eventB) Run a malware scan on the CEO - s workstationC) Reimage the CEO - s workstationD) Disconnect the CEO - s workstation from the network2. An incident response manager has started to gather all the facts related to a SIEM alert showing multiple systems may have been compromised. The manager has gathered these facts: The breach is currently indicated on six user PCs One service account is potentially compromised Executive management has been notified In which of the following phases of the IRP is the manager currently working?A) RecoveryB) EradicationC) ContainmentD) Identification3. An information security analyst needs to work with an employee who can answer questions about how data for a specific system is used in the business. The analyst should seek out an employee who has the role of:A) stewardB) ownerC) privacy officerD) systems administrator4. An information system owner has supplied a new requirement to the development team that calls for increased non-repudiation within the application. After undergoing several audits,the owner determined that current levels of non-repudiation were insufficient. Which of the following capabilities would be MOST appropriate to consider implementing is response to the new requirement?A) Transitive trustB) Symmetric encryptionC) Two-factor authenticationD) Digital signaturesE) One-time passwords5. An in-house penetration tester has been asked to evade a new DLP system. The tester plans to exfiltrate data through steganography. Discovery of which of the following would help catch the tester in the act?A) Abnormally high numbers of outgoing instant messages that contain obfuscated textB) Large-capacity USB drives on the tester's desk with encrypted zip filesC) Outgoing emails containing unusually large image filesD) Unusual SFTP connections to a consumer IP address Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 53

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 53

Questions 1. A user frequently travels with a Windows laptop and connects to several wireless networks. At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue?A) A. The location profile is set to public.B) B. Workgroup is disabled.C) C. The proxy settings are misconfigured.D) D. Remote assistance is not configured.2. Which of the following identifies traffic based upon its physical network address?A) A. PhishingB) B. HashingC) C. MAC filteringD) D. Geotracking3. Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?A) A. Commercial licenseB) B. Enterprise licenseC) C. Seat licenseD) D. Open source license4. A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue?A) A. Power off the deviceB) B. Install an add-on cardC) C. Update the WiFi antennaD) D. Update firmware5. Joe, a technician, arrives onsite at a customer-s home. Upon entering the home, Joe notices an unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the behavior to Joe's supervisor. The supervisor decides the issue must be addressed. Which of the following topics would the supervisor be MOST likely to cover?A) A. Maintaining good communications with the customerB) B. Maintaining good personal hygieneC) C. Avoiding being judgmentalD) D. Avoid dismissing the customer-s problems Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 3

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 3

Questions 1. Which of the following statements is valid in the file /etc/resolv.conf?A) A. order hosts,bindB) B. 192.168.168.4 dns-serverC) C. hosts: files,dnsD) D. domain example.com2. Which of the following is a correct entry in the /etc/hosts file?A) A. localhost 127.0.0.1 localhost.localdomainB) B. localhost.localdomain localhost 127.0.0.1C) C. localhost localhost.localdomain 127.0.0.1D) D. 127.0.0.1 localhost.localdomain localhostE) E. localhost.localdomain 127.0.0.1 localhost3. What is the purpose of the dig command?A) A. It can be used as a tool for querying DNS servers.B) B. It can be used for searching through indexed file content.C) C. It can be used to look for open ports on a system.D) D. It can be used to ping all known hosts on the current subnet.4. When issuing the command ifconfig eth0 192.168.1.20/24 up, which of the following happens? (Choose TWO correct answers.)(Select 2answers)A) A. The address 192.168.1.20 is associated with the interface eth0.B) B. A network route to 192.168.1.0 with the netmask 255.255.255.0 pointing directly to eth0 is created.C) C. 192.168.1.1 is probed for router functionality and, in case of success, it is added to the list of default routers.D) D. The addresses from 192.168.1.20 to 192.168.1.24 are activated on the interface eth0.E) E. If eth0 was configured with a previous IP address, it is retained in addition to adding the new address5. Given the following routing tableKernel IP routing table -Destination Gateway Genmask Flags Metric Ref Use Iface192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0Why does the command route add default gw 192.168.1.1 fail?A) A. Because there is no route to 192.168.1.1.B) B. Because only one route can exist at a time.C) C. Because there is already a default route.D) D. Because default routes can not be set manually.E) E. Because default routes must be set with ifconfig. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 29

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 29

Questions 1. An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:A) Passive reconnaissanceB) PersistenceC) Escalation of privilegesD) Exploiting the switch2. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol. Which of the following configurations should the instructor implement?A) WPA2B) WPAC) EAPD) WEP3. Ann,a college professor,was recently reprimanded for posting disparaging remarks re-grading her coworkers on a web site. Ann stated that she was not aware that the public was able to view her remakes. Which of the following security-related trainings could have made Ann aware of the repercussions of her actions?A) Data Labeling and disposalB) Use of social networkingC) Use of P2P networkingD) Role-based training4. Ann,a customer,is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred?A) RansomwareB) KeyloggerC) Buffer overflowD) Rootkit5. Ann. An employee in the payroll department,has contacted the help desk citing multiple issues with her device,including: Slow performance Word documents,PDFs,and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice,she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?A) SpywareB) Crypto-malwareC) RootkitD) Backdoor Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 54

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 54

Questions 1. A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT?A) A. Quarantine infected systemB) B. Schedule scans and run updatesC) C. Report the issue to the information security officerD) D. Disable System Restore (in Windows)E) E. Educate end user2. A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A -non-system disk or disk error is observed. Which of the following should the technician do FIRST?A) A. Update the motherboard firmwareB) B. Check the cablesC) C. Replace the optical driveD) D. Check the BIOS setting3. A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization?A) A. SMTPB) B. iCalC) C. POP3D) D. IMAP4. A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser.Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?A) A. AdvancedB) B. SecurityC) C. PrivacyD) D. Connections5. Virtual machines provide users with the ability to do which of the following?A) A. Extend 32-bit machines to 64-bitsB) B. Share hardware resourcesC) C. Increase the network download speedD) D. Use less memory in the machine Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 4

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 4

Questions 1. In order to discover the link layer address of the device that owns a specific IPv4 or IPv6 address, which mechanism is used?A) A. Both IPv4 and IPv6 use ARP.B) B. Both IPv4 and IPv6 use Neighbor Discovery.C) C. IPv4 uses ARP while IPv6 uses Neighbor Discovery.D) D. IPv4 uses Neighbor Discovery while IPv6 uses ARP.E) E. Both IPv4 and IPv6 can use either ARP or Neighbor Discovery depending on the network.2. Which of the following are valid IPv4 network masks? (Choose TWO correct answers.)(Select 2answers)A) A. 255.255.0.0B) B. 255.255.255.65C) C. 255.255.0.255D) D. 0.0.0.1E) E. 255.255.255.2483. How does the ping command work by default?A) A. It sends a UDP packet to port 0 of the remote host and waits to receive a UDP error response in return.B) B. It sends an ARP request to a remote host and waits to receive an ARP response in return.C) C. It sends a TCP SYN packet to a remote host and waits to receive an TCP ACK response in return.D) D. It sends a broadcast packet to all hosts on the net and waits to receive, among others, a response from the target system.E) E. It sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return.4. Which of the following statements is valid in the file /etc/nsswitch.conf?A) A. multi onB) B. 192.168.168.4 dns-serverC) C. hosts: files dnsD) D. include /etc/nsswitch.d/5. Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)(Select 3answers)A) A. 127.0.0.0/8B) B. 10.0.0.0/8C) C. 169.255.0.0/16D) D. 172.16.0.0/12E) E. 192.168.0.0/16 Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: A,EExplanation: 3. Right Answer: EExplanation: 4. Right Answer: CExplanation: 5. Right Answer: B,D,EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 30

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 30

Questions 1. Ann,a security administrator,has been instructed to perform fuzz-based testing on the company's applications. Which of the following best describes what she will do?A) Enter random or invalid data into the application in an attempt to cause it to faultB) Work with the developers to eliminate horizontal privilege escalation opportunitiesC) Test the applications for the existence of built-in- back doors left by the developersD) Hash the application to verify it won't cause a false positive on the HIPS2. Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain. Which of the following tools would aid her to decipher the network traffic?A) Vulnerability ScannerB) NMAPC) NETSTATD) Packet Analyzer3. Ann,a security analyst,wants to implement a secure exchange of email. Which of the following is the BEST option for Ann to implement?A) PGPB) HTTPSC) WPAD) TLS4. Ann is the IS manager for several new systems in which the classifications of the systems' data are being decided. She is trying to determine the sensitivity level of the data being processed. Which of the following people should she consult to determine the data classification?A) StewardB) CustodianC) UserD) Owner5. An office manager found a folder that included documents with various types of data relating to corporate clients. The office manager notified the data included dates of birth,addresses,and phone numbers for the clients. The office manager then reported this finding to the security compliance officer. Which of the following portions of the policy would the security officer need to consult to determine if a breach has occurred?A) PublicB) PrivateC) PHID) PII Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs