Multiple Choice
Match each item with a statement below:
-Nessus
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Narrowband communications are data signals that are
Q3: What is the difference between an IKE-Scan
Q4: What are the steps involved in performing
Q5: Provide a brief description of each of
Q6: A _ is a hexadecimal security code
Q8: _ is an iPhone jailbreaking program for
Q9: Match each item with a statement below:<br>-THC-Scan<br>A)
Q10: Kismet identifies networks by passively collecting packets,
Q11: Match each item with a statement below:<br>-PhoneSweep<br>A)
Q12: A username is often stored in an