When using the inbuilt ping command to identify live hosts what is most useful
writing a loop to ping a target range
Which protocol establishes authentication via the use of tickets?
Kerberos
Under CMA is it a crime to view the source code of a web application
no
On conviction on indictment, which offence carries the highest potential prison sentence
Section 3
What layer of the OSI model does ARP operate on
layer 2
When was the Data Protection Act last updated
2018
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
path traversal attacks
WEP IV packets are what size
3 bytes
Which of the following is a valid mode of operation for the IPSec protocol?
Tunnel mode
If a compromised windows machine stores passwords in both LM and NTLM hashing formats, which would be better to crack
LM as passwords will have a maximum character length of 7