You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of
noise in order to evade IDS?
Bob, your senior colleague, has sent you a mail regarding aa deal with one of the clients. You are requested to accept the offer and you oblige.
After 2 days, Bob denies that he had ever sent a mail.
What do you want to "know" to prove yourself that it was Bob who had send a mail?
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to
begin this negotiation?
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you
most likely select?