Question 6 of 285

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 285

Which of the following protocols is used by TFTP as a file transfer protocol?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 285

Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. (Choose three.)
Answer

Suggested Answer

The suggested answer is A, B, C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 285

Which of the following monitors program activities and modifies malicious activities on a system?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 285

Which of the following wireless security features provides the best wireless security mechanism?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours