Which of the following is used to gather information about a remote network protected by a firewall?
Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?
Fill in the blank with the appropriate term.
______ is a free Unix subsystem that runs on top of Windows.
Which of the following is the best method of accurately identifying the services running on a victim host?
You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?
Each correct answer represents a complete solution. Choose all that apply.
Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?
Which of the following methods can be used to detect session hijacking attack?
Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?