Which of the following Nmap commands would be used to perform a stack fingerprinting?
Destination unreachable administratively prohibited messages can inform the hacker to what?
What does a type 3 code 13 represent?
What are two things that are possible when scanning UDP ports?
What is the disadvantage of an automated vulnerability assessment tool?
Which of the following is an automated vulnerability assessment tool.
What flags are set in a X-MAS scan?
What is the proper response for a X-MAS scan if the port is open?
What is the proper response for a X-MAS scan if the port is closed?
What is the proper response for a FIN scan if the port is open?