As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
What tool can crack Windows SMB passwords simply by listening to network traffic?
A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.
Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.
User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?