How many addresses are in the following network /29
8
What is the main difference betweem a worm and a virus?
worm is self replicating
Which of the following is NOT recommended for securing Web applications against authenticated users?
Client-side data validation
Which tool can be used to perform a DNS IP lookup of a specified host
nslookup
A hacker breaks into a banking system with the intent to transfer money into their account, which section of Computer Misuse Act is most aplicable to this activity
2
Can server responses be intercepted by BurpSuite
yes
What is a benefit of public key encryption compared to symmetric encryption
It does not require a secure exchange of a password
Which of the following commands would brute force files on a tftp server?
tftpbrute.pl <IP> wordlist.txt
If a compromised windows machine stores passwords in both LM and NTLM hashing formats, which would be better to crack
LM as passwords will have a maximum character length of 7
Which wireless protocol is attacked by gathering IV packets
WEP