Question 96

Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
  • Question 97

    You are analyzing a traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs. - 192.168.8.0/24. What command you would use?
  • Question 98

    What is the best description of SQL Injection?
  • Question 99

    What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
  • Question 100

    You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
    What tool will help you with the task?