Which of the following can hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
A. availability
B. ICMP
C. auto recovery
D. presence
Answer: B
You might also like to view...
Match the keystrokes with their description
I. Up arrow II. Home III. End IV. Tab + Enter V. Ctrl + Home A. Moves to the first field in the record B. Moves to the last field in the record C. Moves to the first field of the first record D. Move from record to record E. Move one field at a time
You can ________ several shapes to create a new shape
A) stack B) merge C) export D) group
The Corrections button is in the ____ group.
A. Color B. Adjust C. Format D. Illustrations
The ____________________ feature forces text to stay within the confines of the Code Inspector window, allowing you to read without scrolling sideways.
Fill in the blank(s) with the appropriate word(s).