Which of the following is a firewall discovery tool that crafts packets with a TTL set to expire one hop past the firewall?
a. Traceroute
b. Firewalk
c. Banner grabbing
d. Hping
ANS: B
You might also like to view...
After we create a(n) ____, we can send a corresponding message to a(n) ____ to elicit a desired behavior.
A. object; class B. class; object C. method; object D. object; method
Name the four generations of cellular technology, and describe each.
What will be an ideal response?
Write a function that takes a single filename as an argument and adds execute permission to the file for the user.
a. When might such a function be useful? b. Revise the script so it takes one or more filenames as arguments and adds execute permission for the user for each file argument. c. What can you do to make the function available every time you log in Suppose that, in addition to having the function available on subsequent login sessions, you want to make the function available in your current shell. How would you do so??
Which of the following is true?
a. RAM is where the CPU is located. b. Intel is the only manufacturer of CPUs. c. The CPU contains the ALU. d. The Windows System Properties window tells you how much memory you should buy.