Шукаєте відповіді та рішення тестів для Основи Етичного Хакінгу? Перегляньте нашу велику колекцію перевірених відповідей для Основи Етичного Хакінгу в vns.lpnu.ua.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
What is the best definition of a rootkit?
Which DoS attack uses an oversized (>65,536 bytes) ICMP packet to create a situation where the operating system of the target machine either freezes or crashes?
Which one of the following items is not a benefit that can result from penetration testing?
Which one of the following activities is not a step in a typical penetration test?
Which DoS attack uses the Internet Control Message Protocol (ICMP) to overwhelm the victim’s network with message traffic? (To initiate the attack, the attacker spoofs the IP source address of the ping packet by inserting the address of the victim site as the source address.)
Which DoS attack sends large numbers of UDP echo messages with spoofed source addresses to IP broadcast addresses of a very large network?
What type of vulnerabilities will be found by a vulnerability scanner?
Alex wants to use an automated tool to fill web application forms to test for format string vulnerabilities. What type of tool should he use?
Earlier this year, the information security team at Jim’s employer identified a vulnerability in the web server that Jim is responsible for maintaining. He immediately applied the patch and is sure that it installed properly, but the vulnerability scanner has continued to flag the system as vulnerable even though Jim is sure the patch is installed. Which of the following options is Jim’s best choice to deal with the issue?
During a port scan, Lauren found TCP port 443 open on a system. Which tool is best suited to scanning the service that is most likely running on that port?