In x86 assembly, what is the value of a NOP (No Operation) instruction
x90
Which layer of the OSI Model users the TCP protocol
layer 4
What does CVE stand for
Common Vulnerabilities and Exposures
Can server responses be intercepted by BurpSuite
yes
to conduct a ping sweep which flag would be used
-sn
Which of the following is omitted from IPv6
Broadcasts
For section 2 of the computer misuse act to have been broken the following is true
The crime conducted after the unauthorised access does not *have* to use a computer
If a bi-directional trust relationship has been created between domain A and domain B which of the following is correct
If the domain admin in domain A is compromised, then the domain admin in domain B is also compromised
What kind of attack would impact the A in CIA
DoS
What is the legal age of consent for data processing under the Data Protection Act
13