Daily Multiple Choice Test

Using Asymmetric encryption, if Jim wants to send SDwight a private email, what information is needed?
Jim must know Dwights Public key
Jim must know Dwights Private Key
Dwight must know Jims Public Key
Both Jim and Dwight must know each others Public Keys
Jim must know Dwights Public key
What does CVSS stand for
Common Vulnerability Scoring System
Common Vulnerability Scoring Standard
Credential Value Setting Store
Common Value System Setting
Common Vulnerability Scoring System
During a port scan you notice that ports 88, 389 and 3389 are open on a host. What are you most likely looking at?
Domain Controller
Domain Name Server
Router
Firewall with management interface
Domain Controller
Which protocol does not transmit data in plaintext
SNMPv3
SNMPv2c
SNMPv6
SNMPv1
SNMPv3
what is the -T flag responsible for
controlling the speed of a scan
controlling the order of a scan
running a traceroute during a scan
terminates a scan if an error occurs
controlling the speed of a scan
when running ping 8.8.8.8, how many ping request will a linux machine send
an unlimited number
4
100
1
an unlimited number
which command would initiate a SYN Scan of the 192.168.1.0/24 range
nmap 192.168.1.0/24
nmap -sT 192.168.1.0/24
nmap -sSYN 192.168.1.0/24
nmap -sS -h 192.168.1.0/24
nmap 192.168.1.0/24
Why would Windows 2003 be considered a dangerous operating system
It is no longer in Microsofts support lifecycle
It is no longer supporting MD5
It does not support RDP
It cannot be added to a domain
It is no longer in Microsofts support lifecycle
which commandline tool can be used to extract the ntds.dit file?
ntdsutil
nmap
wmic
netstat
ntdsutil
Which of the following is omitted from IPv6
Broadcasts
SSIDs
DNS
NAT
Broadcasts
Your Score
Score Label
Score Summary