Which common tool can be used to crack WPA keys
aircrack-ng
Which of the following is NOT recommended for securing Web applications against authenticated users?
Client-side data validation
Which flag can be used after an nmap scan has started?
-v
Which of the following is true about a certificate revocation list?
It should be kept public
which tags can be commonly to trigger for XSS
<script></script>
Denial of Service attacks affect which of the following
Availability
which command would initiate a SYN Scan of the 192.168.1.0/24 range
nmap 192.168.1.0/24
In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source?
Cross-Site Scripting
What does WSUS stand for?
Windows Server Update Services
What service can be found on TCP port 22
SSH