QUESTION 21 How would an attacker that possesses an exploit for the application on Windows port 3389 find potentialets on an internal network? 1. by port scanning 2. by using Shodan 3. by port hunting 4. by performing a vulnerability scan
QUESTION 1 When it comes to web applications, which of the following are insecure development practices? 1. inconsistent patch releases 02. use of components with known vulerabilities 3. incorrect security configurations 4. all of the above
QUESTION 40 Which of the following protocols can be used to DDoS a target because its response packets are much larger than its request packets? 01.ntp 2.aarp 3. ssh 4.arp
QUESTION 1 When it comes to web applications, which of the following are insecure development practices? 01.inconsistent patch releases 2. use of components with known vulerabilities 3. incorrect security configurations 04. all of the above
QUESTION 21 How would an attacker that possesses an exploit for the application on Windows port 3389 find potentialets o
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am