A) Telnetting
B) Dial hacking
C) Phreaking
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Port
B) Scan
C) Script
D) None of the above
Correct Answer
verified
Multiple Choice
A) Enumeration
B) Phishing
C) Mapping
D) Scanning
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Injection
B) Processing
C) Attacking
D) Execution
Correct Answer
verified
Multiple Choice
A) Cross-site scripting
B) Phreaking
C) Phishing
D) None of the above
Correct Answer
verified
Multiple Choice
A) FIN
B) XMAS
C) SYN
D) ACK
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Penetration
B) Location
C) Virus
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Parameters
B) Flags
C) Switches
D) None of the above
Correct Answer
verified
Multiple Choice
A) Ports
B) Processes
C) Applications
D) Programs
Correct Answer
verified
Multiple Choice
A) Active scanning
B) Passive scanning
C) Phreaking
D) Scouring
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Portscan
B) Nmap
C) Servport
D) NetBIOS
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sid2User
B) Cheops
C) Netcat
D) OphCrack
Correct Answer
verified
Showing 1 - 20 of 25
Related Exams