respuestas al libro the hacker
Respuestas a la pregunta
Contestado por
6
espero que sea esto :v ...
CHAPTER 1 Evolution of Hacking
CWritten
authorization
Vulnerablilty
Scanning
D
D
B
D
D
D
CHAPTER 2 TCP/IP Review
CD
B
C
ping
B
D
B
C
B
CHAPTER 3 Cryptographic Concepts
AB
D
C
A
C
C
D
B
A
A
A
A
CHAPTER 4 Physical Security
BC
C
Bollard
A
C
D
A
D
D
B
D
A
CHAPTER 5 Footprinting Tools and Techniques
AA
D
EDGAR
C
ARIN
C
B
D
A
CHAPTER 6 Port Scanning
A
C
DB
A
B
D
A
UDP
D
B
A
C
CHAPTER 7 Enumeration and Computer System Hacking
BB
B
A
A
B
Backdoor
A
A
Password cracker
A
C
CHAPTER 8 Wireless Vulnerabilities
BA
Bluetooth
A
D
A
B
A
A
C
CHAPTER 9 Hacking Web Servers
BA
B
B
B
A and C
C
B
B
CHAPTER 10 Trojans and Backdoors
BA
C
C
C
B
B
Education
A
A
B
A
Logic bombs
B
CHAPTER 11 Malware, Worms, and Viruses
AA
D
B
Covert channels
A
A
D
CHAPTER 12 Sniffers, Session Hacking, and Denial of Service Attacks
AB
B
A
A
Hijacking
MAC flooding
A
B
B
Otras preguntas