You work as a Security Administrator for ABC Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.What are these vulnerabilities?Each correct answer represents a complete solution. (Choose three.)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.Which of the following tools can you use to accomplish the task?
Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)
Which of the following wireless security features provides the best wireless security mechanism?
Which of the following protocols is used by TFTP as a file transfer protocol?
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?