What should be your next step to identify the OS?
While attempting to discover the remote operating system on the target computer, you receive the
following results from an nmap scan:
Remote operating system guess: Too many signatures match to reliably guess the OS.
Nmap run completed — 1 IP address (1 host up) scanned in 277.483 seconds
What should be your next step to identify the OS?
which of the following sets of requests does it send to the target device?
When Nmap performs a ping sweep, which of the following sets of requests does it send to the
target device?
_________ is one of the programs used to wardial.
_________ is one of the programs used to wardial.
What are the default passwords used by SNMP?
What are the default passwords used by SNMP? (Choose two.)
Which of the following ICMP message types are used for destinations unreachables?
Which of the following ICMP message types are used for destinations unreachables?
What is the proper response for a FIN scan if the port is closed?
What is the proper response for a FIN scan if the port is closed?
What is the proper response for a X-MAS scan if the port is closed?
What is the proper response for a X-MAS scan if the port is closed?
What flags are set in a X-MAS scan?
What flags are set in a X-MAS scan?(Choose all that apply.
Which of the following is an automated vulnerability assessment tool?
Which of the following is an automated vulnerability assessment tool?
What would be the name of this multifunctional tool?
John is using a special tool on his Linux platform that has a signature database and is therefore
able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts.
Additionally, the database detects DDoS zombies and Trojans. What would be the name of this
multifunctional tool?