A. To sign a DNS zone
B. To authenticate a DNS server
C. To provide information about DNSSEC key signing keys
D. To prevent zone enumeration
A. Zero Scan
B. FIN Scan
C. UDP SYN Scan
D. IP Scan
E. Xmas Scan
A. To map an IP address to a hostname
B. To provide information about a DNS server
C. To sign a DNS zone
D. To verify the authenticity of a DNS query
A. www.example.com
B. soa.example.com
C. _443_tcp.www.example.com
D. dane.www.example.com
E. example.com
A. A type of denial-of-service attack
B. A type of virus
C. A type of software vulnerability
D. A type of malware that disguises itself as legitimate software
C. A type of malware that disguises itself as legitimate software
D. A type of phishing scam
A. An attack that floods a network or server with traffic to make it unavailable
B. An attack that aims to steal sensitive information
C. An attack that targets a specific user or organization
D. An attack that intercepts communications between two parties to steal information
A. cryptsetup luksDelKey / dev /mapper/crypt- vol 1
B. cryptsetup luksDelKey / dev /mapper/crypt- vol 0
C. cryptsetup luksDelKey /dev/sda 1 0
D. cryptsetup luksDelkey /dev/sda 1 1
A. shadow
B. passwd
C. host
D. service
E. group
A. A
B. SOA
C. NS
D. PTR