What characters may be used to trigger an SQL error
What service operates on TCP port 25
SMTP
which scan will take the longest
nmap -sT -A 192.168.1.0/24
If a bi-directional trust relationship has been created between domain A and domain B which of the following is correct
If the domain admin in domain A is compromised, then the domain admin in domain B is also compromised
Which file is used to list users that are not permitted to use the FTP server
/etc/ftpd/ftpusers
a bitwise prefix-b ased standard interpretation IP addresses is known as
CIDR
to scan the most common 20 ports what command would be used
nmap -sT --top-ports 20 192.168.1.1
what does the command nc -lv 80 do
instructs netcat to listen on port 80
Which attack method creates a misleading context in order to trick a user into making an inappropriate security-related decision
social engineering
which SQL statement checks for the version of a MySQL database
Union select @@,version