Which tool can be used to silently copy files from USB devices?
Which of the following is an example of IP spoofing?
How can telnet be used to fingerprint a web server?
An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?