Question 76
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Question 77
When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.
What command will help you to search files using Google as a search engine?
What command will help you to search files using Google as a search engine?
Question 78

What does the option * indicate?
Question 79
The collection of potentially actionable, overt, and publicly available information is known as
Question 80
In the field of cryptanalysis, what is meant by a "rubber-hose" attack?
