Question 121

What is the major difference between a worm and a Trojan horse?
  • Question 122

    In which of the following attacks does the attacker gather information to perform an access attack?
  • Question 123

    Against which of the following does SSH provide protection?
    Each correct answer represents a complete solution. Choose two.
  • Question 124

    In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to
    steal the session cookie?
  • Question 125

    Which of the following applications is NOT used for passive OS fingerprinting?