With regard to brute forcing of logon accounts on a windows platform which of the following statements is true?
The windows lock out policy does not apply to the account with RID 500
Which wireless protocol is attacked by gathering IV packets
WEP
which port does TFTP use
UDP/69
If a company has an email server, have they consented to receive emails
yes
What HTTP method can be used to upload a file?
Put
Which of the following most accurately describes freely available material on the Internet, which may be useful to an attacker?
Open source intelligence (OSINT)
When using the inbuilt ping command to identify live hosts what is most useful
writing a loop to ping a target range
which command can be used to identify OS version and traceroute to host
nmap -A 192.168.1.1
What does OSPF stand for
Open Shortest Path First
which output flag would be most effective for extracting information via the grep command?
-oG