WEP IV packets are what size
3 bytes
What best describes a logic bomb
malware that is triggered by a specific condition
OpenVAS is a kind of…?
Vulnerability scanning tool
what is the -T flag responsible for
controlling the speed of a scan
Which DNS record is used to identify a Mail Server
MX
Which part of the Computer Misuse Act provides details about Jurisdiction
4
What is the CIDR notation of a 255.255.255.224 network address
/19
to be able to define a specific nse script to run, which flag would you use
--script
When was the Data Protection Act last updated
2018
Which protocol is used to automatically assign an IP Address to a device?
DHCP