Correct Answer: i
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
Which of the following operating systems are vulnerable to distributed denial-of—service (DDOS) attacks?
For specifying a maximum transmission unit {MTU), which of the following is the correct nmap command that will generate a 32 byte packet?
Which of the following Linux commands is used for showing local or remote established connections?
In order to prevent Trojan attacks, which ofthe following tools should be used for real-time tracking of port usage?
Which of the following Linux directories contains programs for use by the system and system administrator?
Which type of malware has the following characteristics?
Which of the following options is a program that is used for automating an action in such a way that the action can be repeatedly performed at a much higher rate and for a longer period than a human Operator could perform?
Sniffing can be done in both ways, i.e. from command line utility and graphic user interface (GUI).
Which are sniffing tools? i) Wireshark ii) Cain and Abel iii) Dsniff iv) Ettercap v) Tcpdump
In the Linux operating system, which of the following commands can be used for retrieving DNS and host-related information?