Unit 3 Question Answer
Unit 3 Question Answer
Reveals potential entry points, like poorly secured shares or weak user
credentials.
What is Metasploit?
1. Desktop Spyware:
2. Email Spyware:
o Monitors your email activity, such as reading or sending emails,
and may capture sensitive information.
3. Internet Spyware:
4. Child-Monitoring Spyware:
5. Screen-Capturing Spyware:
6. USB Spyware:
1. Port Scanning: Identifying open ports to find ones not blocked by the
firewall.
2. Protocol Manipulation: Using tunneling techniques like HTTP or
HTTPS to bypass port-based rules.