What are two things that are possible when scanning UDP ports?
What are two things that are possible when scanning UDP ports? (Choose two.
What is the disadvantage of an automated vulnerability assessment tool?
What is the disadvantage of an automated vulnerability assessment tool?
________ is an automated vulnerability assessment tool.
________ is an automated vulnerability assessment tool.
What would be the name of this multifunctional tool?
John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans. What would be the name of this multifunctional tool?
Which of the following is an automated vulnerability assessment tool.
Which of the following is an automated vulnerability assessment tool.
What flags are set in a X-MAS scan?
What flags are set in a X-MAS scan?(Choose all that apply.
What is the proper response for a X-MAS scan if the port is open?
What is the proper response for a X-MAS scan if the port is open?
What is the proper response for a X-MAS scan if the port is closed?
What is the proper response for a X-MAS scan if the port is closed?
What is the proper response for a FIN scan if the port is open?
What is the proper response for a FIN scan if the port is open?
What is the proper response for a FIN scan if the port is closed?
What is the proper response for a FIN scan if the port is closed?