Question 43

If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?

Correct Answer:B

Question 44

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Correct Answer:B

Question 45

This TCP flag instructs the sending system to transmit all buffered data immediately.

Correct Answer:C

Question 46

What is correct about digital signatures?

Correct Answer:A

Question 47

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?

Correct Answer:C

Question 48

Which is the first step followed by Vulnerability Scanners for scanning a network?

Correct Answer:D

START 312-50v11 EXAM