Multiple Choice
Match each item with a statement below.
-Request not allowed for the resource
A) HTTP 400 Bad Request
B) HTTP 403 Forbidden
C) HTTP 404 Not Found
D) HTTP 405 Method Not Allowed
E) HTTP 408 Request Timeout
F) HTTP 500 Internal Server Error
G) HTTP 502 Bad Gateway
H) HTTP 503 Service Unavailable
I) HTTP 504 Gateway Timeout
J) HTTP 409 Conflict
Correct Answer:

Verified
Correct Answer:
Verified
Q29: Which tool can be used to gather
Q30: Which type of social engineering attack attempts
Q31: What social engineering tactic can be utilized
Q32: Match each item with a statement below.<br>-Server
Q33: Wget is a *nix system command that
Q35: Match each item with a statement below.<br>-Request
Q36: How can a computer criminal use HTTP
Q37: To see additional parameters that can be
Q38: Network attacks can often begin by gathering
Q39: List and explain the five techniques used