Section 3 - Understanding Common TCP/IP Attacks

Exit

Question 1 of 1

  Time Left


0 [{"id":378517,"quiz_id":"19370","answer_id":null,"answerType_id":"0","created_at":"2018-02-13 21:30:49","updated_at":"2018-02-13 21:31:57","questionName":"What best describes an attack vector?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":378521,"quiz_id":"19370","answer_id":null,"answerType_id":"0","created_at":"2018-02-13 21:33:19","updated_at":"2018-02-13 21:33:19","questionName":"What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":378519,"quiz_id":"19370","answer_id":null,"answerType_id":"0","created_at":"2018-02-13 21:32:37","updated_at":"2018-02-13 21:32:37","questionName":"What best describes an attack surface?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
378517
0
120
block

What best describes an attack vector?

Select the correct answer(s).  

(0/0)












378521
0
120
none
378519
0
120
none