Question 11

Which of the following is not a DDoS attack?
  • Question 12

    What types of attacks are phishing, spear phishing, vishing, scareware, and watering hole?
  • Question 13

    What is the response from a closed TCP port which is behind a firewall?
  • Question 14

    Which one of the following is a phishing email?

  • Question 15

    Which is the correct command to change the MAC address for an Ethernet adapter in a Unix-based system?