Multiple Choice
A threat actor has gone to a local coffee shop and opened a program that can analyze traffic being sent and received on the network. He finds that someone on the network is sending emails using SMTP without encryption, and he can see the contents of the emails. Which of the following programs is he most likely using?
A) netstat
B) dig
C) Wireshark
D) Nessus
Correct Answer:

Verified
Correct Answer:
Verified
Q7: Cyndi, a cybersecurity researcher, has been hired
Q8: Jorge is analyzing the event logs on
Q9: Match the command switch used with nmap
Q10: Match the command switch used with nmap
Q11: Match the command switch used with nmap
Q13: Thierry wants to implement a method of
Q14: Talera believes an evil twin might be
Q15: Tina wants to determine the fault toleranceof
Q16: Ian, a cybersecurity analyst, wants to use
Q17: Neo wants to consolidate real-time monitoring and