Which of the following can hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?

A. availability
B. ICMP
C. auto recovery
D. presence


Answer: B

Computer Science & Information Technology

You might also like to view...

Match the keystrokes with their description

I. Up arrow II. Home III. End IV. Tab + Enter V. Ctrl + Home A. Moves to the first field in the record B. Moves to the last field in the record C. Moves to the first field of the first record D. Move from record to record E. Move one field at a time

Computer Science & Information Technology

You can ________ several shapes to create a new shape

A) stack B) merge C) export D) group

Computer Science & Information Technology

The Corrections button is in the ____ group.

A. Color B. Adjust C. Format D. Illustrations

Computer Science & Information Technology

The ____________________ feature forces text to stay within the confines of the Code Inspector window, allowing you to read without scrolling sideways.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology