Question 121
What is the major difference between a worm and a Trojan horse?
Question 122
In which of the following attacks does the attacker gather information to perform an access attack?
Question 123
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
Question 124
In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to
steal the session cookie?
steal the session cookie?
Question 125
Which of the following applications is NOT used for passive OS fingerprinting?