Which of the following tools is best suited to testing known exploits against a system?

A. Nikto
B. Ettercap
C. Metasploit
D. THC Hydra


Answer: C. Metasploit

Computer Science & Information Technology

You might also like to view...

USB flash drives use ____________________ storage technology, which provides fast access to data, and holds data even when not connected to a power source.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have?

a. P2P network b. Client/server network c. both A and B d. neither A and B

Computer Science & Information Technology

Use a ________ query to display fields and records that match specified conditions

A) criteria B) filter C) select D) sort

Computer Science & Information Technology

Used with the ToString function, the ____ format specifier will display the value 8976.43561 as 8,976.44.

A. Fixed (F) B. Number (N) C. Currency (C) D. General ( G)

Computer Science & Information Technology