Which of the following scans is most likely to be detected by the target system?

a. Ping scan
b. Connect scan
c. SYN scan
d. FIN scan


ANS: B

Computer Science & Information Technology

You might also like to view...

________ monitor networks and application log files—files containing information on files, including who accessed them and when—so if an intruder makes it into the network or an unauthorized application, the system detects the intrusion, halts the session and sets off an alarm to notify the system administrator.

a) Intrusion-detection systems. b) Digital-signature systems. c) Air-gap systems. d) None of the above

Computer Science & Information Technology

Which of the following statements is true?

a. The Throw statement is used to throw an exception. b. The Throw statement is used to specify that a method will throw an exception. c. The Throw statement is used to access an exception parameter. d. All of the above.

Computer Science & Information Technology

Every computer has an operating system

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____________________ indent is an indent where the first line of a paragraph is aligned flush left with the margin and all lines below it are indented.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology