Which of the following describes network traffic that originates from the inside of a network
perimeter and progresses towards the outside?
C
Which of the following protocols uses only User Datagram Protocol (UDP)?
D
OutGuess is used for __________ attack.
A
Which of the following strategies allows a user to limit access according to unique hardware
information supplied by a potential client?
C
Which of the following is the Web 2.0 programming methodology that is used to create Web pages
that are dynamic and interactive?
B
Which of the following protocol loggers is used to detect ping sweep?
D
Which of the following options scans the networks for vulnerabilities regarding the security of a
network?
C
Which of the following is used to determine the range of IP addresses that are mapped to a live
hosts?
B
Which of the following is a process of searching unauthorized modems?
B
Which of the following applications is NOT used for passive OS fingerprinting?
D