- (Topic 2)
You want to create a binary log file using tcpdump. Which of the following commands will you use?
Correct Answer:C
- (Topic 2)
Which of the following Web authentication techniques uses a single sign-on scheme?
Correct Answer:B
- (Topic 4)
Which of the following tools is used for port redirection?
Correct Answer:B
- (Topic 4)
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ACD
- (Topic 4)
Which of the following tasks is NOT performed into the enumeration phase?
Correct Answer:C
- (Topic 4)
Which of the following are the countermeasures against WEP cracking?
Each correct answer represents a part of the solution. Choose all that apply.
Correct Answer:ACD