What kind of attack would impact the A in CIA
DoS
What service can by typically found on TCP port 53
DNS
Which R service can be used to execute a command on a target machine
rexec
With regard to brute forcing of logon accounts on a windows platform which of the following statements is true?
The windows lock out policy does not apply to the account with RID 500
Which of the following is an authentication protocol for Active Directory
Kerberos
In Windows, what acts as a go intermediary between the hardware and the Kernel?
The hardware abstraction layer
the SSH configuration is located at which location
/etc/ssh/ssh_config
Principal 3 - Data Minimisation states:
personal data shall be limited to what is necessary for the purpose of processing
What is steganography?
The concept of hiding a message within other information
what are we doing when trying to get service version details
banner grabbing