Correct Answer: IGMP
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
In relation to ethical hacking, which of the following statements is correct about botnet?
While using the BackTrack tool with Linux. which of the following commands is used for changing the password of the Linux box?
Proxies operate at which of the following layers of the Open System Interconnection model?
Which of the following Wireshark CLl tools is a small program that is only used for capturing traffic?
Which of the following lPSec mechanisms is used for providing methods for the purpose of authenticating information as well as for encrypting the data?
Which of the following is the correct syntax of the command for creating an ACK packet using HPING3 and sending it to port 80 on a victim?
During which of the following DOS attacks, custom-crafted fragmented packets, having offset values that overlap during the attempted rebuild. are sent by an attacker?
While scanning source ports using the nmap command, which of the following parameters is used for helping a user in specifying a source port?
In which ofthe following types of attacks, cipher text is compared against the pro-computed hashes for finding the match?
The amitis tool, which is used for creating Trojans, opens which of the following ports for giving a hacker complete control over a victim's computer?