What are the default passwords used by SNMP?
What are the default passwords used by SNMP? (Choose two.)
Which of the following ICMP message types are used for destinations unreachables?
Which of the following ICMP message types are used for destinations unreachables?
What is the proper response for a FIN scan if the port is closed?
What is the proper response for a FIN scan if the port is closed?
What is the proper response for a X-MAS scan if the port is closed?
What is the proper response for a X-MAS scan if the port is closed?
What flags are set in a X-MAS scan?
What flags are set in a X-MAS scan?(Choose all that apply.
Which of the following is an automated vulnerability assessment tool?
Which of the following is an automated vulnerability assessment tool?
What would be the name of this multifunctional tool?
John is using a special tool on his Linux platform that has a signature database and is therefore
able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts.
Additionally, the database detects DDoS zombies and Trojans. What would be the name of this
multifunctional tool?
What is the disadvantage of an automated vulnerability assessment tool?
What is the disadvantage of an automated vulnerability assessment tool?
What are two things that are possible when scanning UDP ports?
What are two things that are possible when scanning UDP ports? (Choose two.
What does a type 3 code 13 represent?
What does a type 3 code 13 represent?(Choose two.