Which common tool can be used to crack WPA keys
aircrack-ng
What best describes a logic bomb
malware that is triggered by a specific condition
Viewing the source code of a web application is a breach of which section of the Computer Misuse Act
It is not a crime to view source code
How do you prevent packet-sniffing exploits?
Encrypt network communication with SSL
Which file is used to list users that are not permitted to use the FTP server
/etc/ftpd/ftpusers
The Telnet Banner SunOS5.8 is used by which Operating System?
Solaris 8
In x86 assembly, what is the value of a NOP (No Operation) instruction
x90
What port does Telnet over SSL operate on
TCP/992
What does the SSH-keygen tool do?
generates an SSH key pair
In the context of an operating system, what is always running
The kernel