What is a cross-site scripting (XSS) vulnerability?
Which of the following are examples of vulnerability and port scanners? (Select all that apply.)
What is a backdoor?
Which of the following statements is not true about a daemon process?
Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?
Which of the following is not a possible outcome of a resource exhaustion attack?