Question 96
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
Question 97
You are analyzing a traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs. - 192.168.8.0/24. What command you would use?
Question 98
What is the best description of SQL Injection?
Question 99
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
Question 100
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
What tool will help you with the task?
