Which is the first step followed by Vulnerability Scanners for scanning a network?
Correct Answer:
D
What is the algorithm used by LM for Windows2000 SAM?
Correct Answer:
B
A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?
Correct Answer:
D
This kind of password cracking method uses word lists in combination with numbers and special characters:
Correct Answer:
A
While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences. He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?
Correct Answer:
A