00:00

QUESTION 61

Which of the following is the best method of accurately identifying the services running on a victim host?

Correct Answer: D

QUESTION 62

Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

Correct Answer: B

QUESTION 63

Which of the following DOS commands is used to configure network protocols?

Correct Answer: A

QUESTION 64

Which of the following hacking tools provides shell access over ICMP?

Correct Answer: B

QUESTION 65

Which of the following classes refers to the fire involving electricity?

Correct Answer: D