A fully established UDP handshake consists of which of the following?
There is no handshake
What file permission is commonly used to allow anyone to "use" a program without being able to make modifications to it?
755
to conduct a ping sweep which flag would be used
-sn
In an environment using Dynamic Access control, who controls access to assets?
Asset owners
What does HSTS stand for?
HTTP Strict Transport Security
What command is used to understand what a metasploit module will do during execution
info
Which of the following is the terminology used to define an organisation that determines the use of personal data
controller
Which of the following are most vulnerable to injection attacks?
SQL queries based on user input
How do you prevent packet-sniffing exploits?
Encrypt network communication with SSL
You have just completed a port scan and found ports 80/tcp and 9100/tcp open a host, what is this host likely to be?
A printer