Which of the following is the best method of accurately identifying the services running on a victim host?
Correct Answer:
D
Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?
Correct Answer:
B
Which of the following DOS commands is used to configure network protocols?
Correct Answer:
A
Which of the following hacking tools provides shell access over ICMP?
Correct Answer:
B
Which of the following classes refers to the fire involving electricity?
Correct Answer:
D