1.
In Cyber Security, which of the following tools is not used to guess the operating system of your target?
2.
In Cyber Security, which of the following tools is not used to assess SAP Servers?
3.
In Cyber Security, the Null Scan is __________________________.
4.
In Cyber Security, the Hunt tool is used to __________________________________.
5.
In Cyber Security, how does SSL create a session key?
6.
In Cyber Security, how will you solve an issue if a person in your organization has attached a modem to a telephone line and bypassed the firewall, as a result of which, the person can access the internet?
7.
In Cyber Security, how will you ensure if a new software that has been installed on your system is not trojaned?
8.
In Cyber Security, which one of the following methods will you use to passively gather information about the technologies used in an organization?
9.
In Cyber Security, which of the following is not a reason for 802.11 WEP encryption vulnerability?
10.
In Cyber Security, which of the following port-scanning methods is involved in sending a spoofed packet to the target system and to make adjustments on the IPID in a zombie system?