Multiple Choice
Match each item with a statement below:
-PhoneSweep
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Correct Answer:

Verified
Correct Answer:
Verified
Q4: What are the steps involved in performing
Q5: Provide a brief description of each of
Q6: A _ is a hexadecimal security code
Q7: Match each item with a statement below:<br>-Nessus<br>A)
Q8: _ is an iPhone jailbreaking program for
Q9: Match each item with a statement below:<br>-THC-Scan<br>A)
Q10: Kismet identifies networks by passively collecting packets,
Q12: A username is often stored in an
Q13: All wireless devices that communicate with each
Q14: _ can restore an iPhone to its