Which of these is an insecure cipher?
TLS_RSA_WITH_NULL_MD5
what does the -iL flag do
provides an input list of IP addresses
Which protocol uses temporal keys
WPA
what does the -sV flag do
starts a Version Scan
A network has a subnet mask of 255.255.0.0, how many hosts can there be on the network
65,534
What command is used to display the top of a file?
head
what is the maximum number of hosts the 'Ping Record Route' option can store
9
Which of the following commands cannot be used to enumerate valid users on a SMTP system?
HELLO
Which of the following is an example of 2 factor authentication
chip, pin, password
Which of the following is a valid email header
X-Originating-IP