Live Virtual Machine Lab 8.2: Module 08 Network Security Assessment Tools
Which of the following can be used to detect if a Trojan has infected a system?
Netstat
Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?
OpenSSL
Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?
SSL Strip
Which of the following nmap command is used for file-exclusion?
nmap -iL /tmp/scanlist.txt --excludefile /tmp/exclude.txt
Which of the following command is used to detect OS on a target?
nmap -o
Which of the following command is used to perform FIN scan?
nmap -sF
Which of the following command is used to perform xmas tree scan?
nmap -sX -v