Live Virtual Machine Lab 8.2: Module 08 Network Security Assessment Tools

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following can be used to detect if a Trojan has infected a system?

Netstat

Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?

OpenSSL

Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?

SSL Strip

Which of the following nmap command is used for file-exclusion?

nmap -iL /tmp/scanlist.txt --excludefile /tmp/exclude.txt

Which of the following command is used to detect OS on a target?

nmap -o

Which of the following command is used to perform FIN scan?

nmap -sF

Which of the following command is used to perform xmas tree scan?

nmap -sX -v


Set pelajaran terkait

Week 16 - Palliative Care & End of Life

View Set

BIOLOGY - UNIT 6: MICROBIOLOGY ARCHAEA

View Set

Compensation/Benefits Administration Ch. 8, 9, 10, & 11

View Set

Biology Concepts and Investigations: Chapter 1

View Set

AP Physics Chapter 7 & 8 practice quizzes

View Set

18. Unit 6: Lesson 2: LS Assignment 3

View Set