CEH

Ace your homework & exams now with Quizwiz!

Which of the following is the most basic way to counteract SMTP exploitations?

Ignore messages to unknown recipients instead of sending back error messages.

Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to the clean database. Which of the following detection methods is Jerry using?

Integrity-based

Which of the following is a tool for cracking Windows login passwords using rainbow tables?

Ophcrack

Jack is tasked with testing the password strength for the users of an organization. He has limited time and storage space. Which of the following would be the best password attack for him to choose?

Rainbow attack

On your network, you have a Windows 10 system with the IP address 10.10.10.195. You have installed XAMPP along with some web pages, php, and forms. You want to put it on the public-facing internet, but you are not sure if it has any vulnerabilities. On your Kali Linux system, you have downloaded the nmap-vulners script from GitHub. Which of the following is the correct nmap command to run?

nmap --script nmap-vulners -sV 10.10.10.195


Related study sets

Chapter: Life Insurance Policies

View Set

Chapter 13 (MN) Postpartal Period: Transition to Parenthood

View Set

Abeka 6th Grade, Science Test 3, (Ch.2 2.1-2.6)

View Set