What does CVE stand for
Common Vulnerabilities and Exposures
What does ICMP stand for
Internet Control Message Protocol
Which flag can be used after an nmap scan has started?
-v
A network has a subnet mask of 255.255.0.0, how many hosts can there be on the network
65,534
what is a hash value used for
nonrepudiation
what is the best way to identify live hosts if you have no hacking tools
ping
What 3 point are covered in the CIA model?
Confidentiality, Integrity and Availability
When using the inbuilt ping command to identify live hosts what is most useful
writing a loop to ping a target range
What type of request is needed to initiate a DNS zone transfer
-t axfr
Can server responses be intercepted by BurpSuite
yes