Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?
Correct Answer:B
Which of the following is used to gather information about a remote network protected by a firewall?
Correct Answer:D
Which of the following applications is NOT used for passive OS fingerprinting?
Correct Answer:D
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?
Correct Answer:B
Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?
Correct Answer:C