Correct Answer: nc -n -v -| -p 80
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
In relation to fingerprinting, which of the following is the correct syntax of the command, which is used for identifying the operating system that is serving a website and all the opened ports associated with the domain name? (Assume the domain name as abcExample.com.)
Using Nmap, which Of the following is the correct syntax for performing a ping to a remote Windows or Linux Operating system?
During which type of scan, an attacker sends frames to a victim, without setting any flag?
Which of the following options is a Linux/Unix sniffing tool that is designed for graphically displaying a system's incoming and outgoing connections?
In relation to Buffer overflows, which of the following canaries does not exist?
Which of the following is the correct syntax of the command that can be used to test whether or not a target FTP server is vulnerable to the FTP bounce attack?
While installing the Origami framework on BackTrack, which of the following is the correct tar command that can be used for extracting the contents?
While using the BackTrack tool with Linux, which of the following commands can be used for creating a text file named example?
While using the BackTrack tool with Linux, which of the following commands can be used for creating a directory named Example?
ARP poisoning can be prevented by enabling which of the following options on Cisco switches?