Question
Question 1 To circumvent the firewall and NAT, hackers can install a program called a(n) _____________ on the compromised machine that will initiate a connection
Question 1
To circumvent the firewall and NAT, hackers can install a program called a(n) _____________ on the compromised machine that will initiate a connection from within the network to the attackers computer outside the network.
Inverse Shell
Reverse Shell
Turtle Shell
Bash Shell
Question 2
TCP allows for ________ communication, which means that both the sender and receiver can transmit data at the same time
Full Duplex
Half Duplex
Question 3
The __________ flag represents the SYN scan
-sX
-sT
-sS
-sM
Question 4
Zer0-day vulnerabilities can be profitable.
True
False
Question 5
In the __________ model, clients exchange information directly with one another.
Peer-to-Peer
Delay Server
Pair-to-Pair
Client-Server
Question 6
Many zero-day vulnerabilities are found using a technique called _______.
Muxxing
Fluxxing
Fuzzing
Buzzing
Question 7
On October 21, 2016, the Dyn DNS service fell victim to a DDOS attack that used a botnet called __________
Mordor
Mirai
Maria
Mopnet
Question 8
The _____________ flag enables version detection, which tells nmap to detect the version of each application running on the port.
-Sv
-sV
-sS
-vV
Question 9
In Python, the http.server module, which allows you to start a web server.
True
False
Question 10
A(n) _____________ is an API that allows programs to communicate over the network.
Port
Address
Basket
Socket
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started