what is the -T flag responsible for
controlling the speed of a scan
What is encyption most linked to
confidentiality
On conviction on indictment, which offence carries the highest potential prison sentence
Section 3
On a network using the IP & netmask of 141.63.48.196/16 what would the broadcast address be
141.63.255.255
Which wireless protocol was vulnerable to the Krack attack?
WPA2
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?
SQL injection
What does ICMP stand for
Internet Control Message Protocol
Which file is used to list users that are not permitted to use the FTP server
/etc/ftpd/ftpusers
What port does DNS typically use for zone transfers
TCP/53
which of the following is a client side attack
Cross-Site Scripting