Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods can be used to detect session hijacking attack?