Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 To circumvent the firewall and NAT, hackers can install a program called a(n) _____________ on the compromised machine that will initiate a connection

Question 1

To circumvent the firewall and NAT, hackers can install a program called a(n) _____________ on the compromised machine that will initiate a connection from within the network to the attackers computer outside the network.

Inverse Shell

Reverse Shell

Turtle Shell

Bash Shell

Question 2

TCP allows for ________ communication, which means that both the sender and receiver can transmit data at the same time

Full Duplex

Half Duplex

Question 3

The __________ flag represents the SYN scan

-sX

-sT

-sS

-sM

Question 4

Zer0-day vulnerabilities can be profitable.

True

False

Question 5

In the __________ model, clients exchange information directly with one another.

Peer-to-Peer

Delay Server

Pair-to-Pair

Client-Server

Question 6

Many zero-day vulnerabilities are found using a technique called _______.

Muxxing

Fluxxing

Fuzzing

Buzzing

Question 7

On October 21, 2016, the Dyn DNS service fell victim to a DDOS attack that used a botnet called __________

Mordor

Mirai

Maria

Mopnet

Question 8

The _____________ flag enables version detection, which tells nmap to detect the version of each application running on the port.

-Sv

-sV

-sS

-vV

Question 9

In Python, the http.server module, which allows you to start a web server.

True

False

Question 10

A(n) _____________ is an API that allows programs to communicate over the network.

Port

Address

Basket

Socket

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Reliability Engineering Designing And Operating Resilient Database Systems

Authors: Laine Campbell, Charity Majors

1st Edition

978-1491925942

Students also viewed these Databases questions