Which choice lists the ports used by Microsoft internal networking that should be blocked from outside access?
Which service, tool or command allows a remote or local user to learn the directories or files that are accessible on the network?
Which type of attack occurs when a hacker obtains passwords and other information from legitimate transactions?
Which service, command or tool allows a remote user to interface with a system as if he were sitting at the terminal?
What common target can be reconfigured to disable interfaces and provide inaccurate IP addresses over the Internet?
Which of the following is a way to get around a firewall to intrude into a secure network from a remote location?
Which of the following is the most desirable goal that UNIX system crackers typically hope to achieve?