Conducting a Denial of Service attack is a breach of which section of the Computer Misuse Act
3
Which of the following commands would brute force files on a tftp server?
tftpbrute.pl <IP> wordlist.txt
In DNS what does SOA stand for
Start Of Authority
Windows Server 2008 shipped with which version of IIS?
IIS 7
which of the following is an IPv6 address?
2001:db8::8c28:c929:72db:49fe
where can the nse scripts be found
tbd
A hacker breaks into a banking system with the intent to transfer money into their account, which section of Computer Misuse Act is most aplicable to this activity
2
Under CMA is it a crime to view the source code of a web application
no
Which of the following is an authentication protocol for Active Directory
Kerberos
When an OSI layer 8 issue has been identified, where is the issue??
The issue is the individual person on the computer