Daily Multiple Choice Test

WEP IV packets are what size
3 bytes
8 bytes
24 bytes
0 bytes
3 bytes
What best describes a logic bomb
malware that is triggered by a specific condition
malware use to move assets from one computer to another
malware that is self-replicating
malware that encrypts a file system
malware that is triggered by a specific condition
OpenVAS is a kind of…?
Vulnerability scanning tool
exploitation framework
post exploitation tool
open source Anti-Virus
Vulnerability scanning tool
what is the -T flag responsible for
controlling the speed of a scan
controlling the order of a scan
running a traceroute during a scan
terminates a scan if an error occurs
controlling the speed of a scan
Which DNS record is used to identify a Mail Server
MX
NX
MS
AAAA
MX
Which part of the Computer Misuse Act provides details about Jurisdiction
4
3
2
1
4
What is the CIDR notation of a 255.255.255.224 network address
/19
/22
16
8
/19
to be able to define a specific nse script to run, which flag would you use
--script
-sC
--scr
--script
When was the Data Protection Act last updated
2018
1998
2002
2022
2018
Which protocol is used to automatically assign an IP Address to a device?
DHCP
dynamic addressing
DCHP
IPv4
DHCP
Your Score
Score Label
Score Summary