Question 6 of 285
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
Correct Answer: A

Question 7 of 285
Which of the following protocols is used by TFTP as a file transfer protocol?
Correct Answer: B

Question 8 of 285
Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. (Choose three.)
Correct Answer: A, B, C

Question 9 of 285
Which of the following monitors program activities and modifies malicious activities on a system?
Correct Answer: A

Question 10 of 285
Which of the following wireless security features provides the best wireless security mechanism?
Correct Answer: C