Which of the following open source tools would be the best choice to scan a network for potential targets?
Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?