What does the following command accomplish when run on the victim's system? Datapipe 80 139 10.5.32.1
a. Blocks port 80
b. Blocks port 139
c. Redirects traffic from port 80 to port 139
d. Redirects traffic from port 139 to port 80
ANS: D
You might also like to view...
A user needs to use BitLocker to encrypt the drive on a laptop that will contain sensitive information. Unfortunately, the laptop does not have a TPM. Which of the following options will enable the laptop to be used with BitLocker? (choose all that apply)
a. Insert a TPM card into the SmartCard reader. b. Change Group Policy settings. c. Reformat the system drive with BitLocker enabled. d. Use an external USB thumb drive (USB key).
The _________ is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect.
A. event discriminator B. audit analyzer C. archive D. alarm processor