Using Asymmetric encryption, if Jim wants to send SDwight a private email, what information is needed?
Jim must know Dwights Public key
What does CVSS stand for
Common Vulnerability Scoring System
During a port scan you notice that ports 88, 389 and 3389 are open on a host. What are you most likely looking at?
Domain Controller
Which protocol does not transmit data in plaintext
SNMPv3
what is the -T flag responsible for
controlling the speed of a scan
when running ping 8.8.8.8, how many ping request will a linux machine send
an unlimited number
which command would initiate a SYN Scan of the 192.168.1.0/24 range
nmap 192.168.1.0/24
Why would Windows 2003 be considered a dangerous operating system
It is no longer in Microsofts support lifecycle
which commandline tool can be used to extract the ntds.dit file?
ntdsutil
Which of the following is omitted from IPv6
Broadcasts