What command is used to understand what a metasploit module will do during execution
info
When using the inbuilt ping command to identify live hosts what is most useful
writing a loop to ping a target range
What does WPA stand for
Wi-Fi Protected Access
when running ping 8.8.8.8, how many ping request will a linux machine send
an unlimited number
Which Windows command is roughly the equivalent to the Linux command netstat -anp
netstat -anb
Which program is used by Linux to schedule a program or script to run at particular times
cron
What does ICMP stand for
Internet Control Message Protocol
Firewalking typically involves
Sending packets through a firewall on a given port with an increasing TTL value
On conviction on indictment, what is the maximum prison sentence for a breach of Section 2 of the CMA
5 years
Which of the following is an Information Security Standard?
ISO27001