Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Study tips 312-50v6

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably beidentified: 21 ftp 23 telnet 80 http 443https What does this suggest ?

What are two types of ICMP code used when using the ping command?

Why would a modem security tester consider using such an old technique?

What is the most likely cause behind this response?

Which of these would be a cause for alarm?

Which one would you suggest she looks in first?

While footprinting a network, what port/service should you look for to attempt a zone transfer?

What does the following command accomplish?

According to the CEH methodology, what is the next step to be performed after footprinting?

Posts navigation

Previous 1 … 31 32 33 … 125 Next
Equizzing
    Privacy Policy

© 2025 Equizzing