We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. Taylor is probing a DNS server and discovers that it is configured as an open resolver. What is the major risk associated with this configuration?
5. Greg is creating a fake digital certificate for use in a penetration test. He has created his own Certificate Authority. What key does he use to create the signature on the certificate?
9. During a port scan of a system, Veronica discovered that TCP port 22 is open. What service is likely supported by the system?