>THESE THREE FLAGS ARE SET IN A XMAS SCAN PACKETS?

-WHAT ARE FIN,PSH, AND URG?(FIN,PSH,URG)

>THIS FOUR-LETTER WORD REFERS TO THE PROBABILITY OF A THREAT MATERIALIZING

-WHAT IS RISK?

>THESE THREE ITEMS MAKE UP THE CIA TRIAD,A MODEL FOR DESIGNING INFORMATION SECURITY POLICIES

-WHAT ARE CONFIDENTIALITY,INTEGRITY,AND AVAILABILITY

>AN IPV6 ADDRESS USES THIS MANY BITS

-128

>MAGNETS,HOW DO THEY WORK?WELL,IN THIS PROCESS,THEY DESTROYED DATA ON A MAGNETIC MEDIUM

-WHAT IS DEGAUSSING?

>A FIVE-LETTER WORDS DESCRIBING “FAKE”IP ADDRESSES FROM (UNALLOCATED RANGE THAT USED TO SHOW UP IN FIREWALL ROUTING TABLES)

-WHAT IS A BOGON?

--

--

>”17”

-WHAT IS QUOTE OF THE DAY(QOTD)?

>69 ..NOICE

-WHAT IS TRIVIAL FILE TRANSFER PROTOCOL(TFTP)?

>70

-WHAT IS FINGER?

>25

-WHAT IS SIMPLE MAIL TRANSFER PROTOCOL(SMTP)?

>22

-WHAT IS SECURE SHELL (SSH)?

>23

-WHAT IS TELNET?

>110

-WHAT IS POP3?

>161

-WHAT IS SNMP?

>67

-WHAT IS DHCP?

>20

-WHAT IS FTP?

>53

-DNS(Domain Name System)

>80

-HTTP

>42

-Host Name Server (Nameserver)

--

--

Akash Ranjan Patel

Akash Ranjan Patel

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester