Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?
Which of the following are well known password-cracking programs?
What port number is used by LDAP protocol?
Which regulation defines security and privacy controls for Federal information systems and organizations?