What is the correct process for the TCP three-way handshake connection establishment and connection termination?

What is the correct process for the TCP three-way handshake connection establishment and connection termination?
A . Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACK
B . Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACK
C . Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACK
D . Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: ACK, ACK-SYN, SYN

Answer: A

What is his conclusion?

Emil uses nmap to scan two hosts using this command:

nmap -sS -T 4 -O 192.168.99.1 192.168.99.7

He receives this output:

What is his conclusion?
A . Host 192.168.99.7isaniPad.
B . He performed a SYN scan and OSs canon hosts 192.16899.1 and 192.168.99.7
C . Host 192.168.99.1is the host that he launched the scan from.
D . Host 192.168.99.7is down.

Answer: B

What is the purpose of using-sl with Nmap?

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences.

He then decided to conduct: nmap-Pn-p-sl kiosk.adobe.com www.riaa.com kiosk.adobe.com is the host with increment all PID sequence.

What is the purpose of using-sl with Nmap?
A . Conduct stealth scan
B . Conduct ICMP scan
C . Conduct IDLE scan
D . Conduct silent scan

Answer: C

What testing method did you use?

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email and you send her an email changing the source email to her boss’s email([email protected]). In this email you ask for a pdf with information. She reads your email and sends back a pdf with inks. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network.

What testing method did you use?
A . Social engineering
B . Piggybacking
C . Tailgating
D . Eavesdropping

Answer: A