By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABD
Which of the following wireless security features provides the best wireless security mechanism?
Correct Answer:B
Which of the following tools is used to collect volatile data over a network?
Correct Answer:B
Which of the following command-line utilities is used to show the state of current TCP/IP connections?
Correct Answer:C
Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?
Correct Answer:C