Question 6 of 285John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?
Correct Answer: A
Question 7 of 285Which of the following protocols is used by TFTP as a file transfer protocol?
Correct Answer: B
Question 8 of 285Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. (Choose three.)
Correct Answer: A, B, C
Question 9 of 285Which of the following monitors program activities and modifies malicious activities on a system?
Correct Answer: A
Question 10 of 285Which of the following wireless security features provides the best wireless security mechanism?