Question 41

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.
Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?
  • Question 42

    Which of the following functions in c/c++ can be the cause of buffer overflow?
    Each correct answer represents a complete solution. Choose two.
  • Question 43

    Which of the following options scans the networks for vulnerabilities regarding the security of a network?
  • Question 44

    Which of the following tools is described in the statement given below?
    "It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and
    commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."
  • Question 45

    Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?