A new security analyst is given the task of determining whether any of the company's server are vulnerable to a recently discovered attack on an old version of SHH. Which of the following is the quickest FIRST step toward determining the version of SSH running on these servers?

A. Passive scanning
B. Banner grabbing
C. Protocol analysis
D. Penetration testing


Answer: B. Banner grabbing

Computer Science & Information Technology

You might also like to view...

You can attach one or more ____ to a contact to store documents, tables, pictures, or clip art, for example, along with their contact information.

A. locations B. contact groups C. email messages D. files

Computer Science & Information Technology

Once the access mechanism is positioned, the time required for the data to rotate to the read/write head is called __________.

a. rotational delay b. lag time c. access time d. seek time

Computer Science & Information Technology

In the Command Button Wizard, action choices vary depending on the category selected

Indicate whether the statement is true or false

Computer Science & Information Technology

What object class method returns a string that holds the name of the class, just as GetType() does?

A. GetHashCode() B. Equals() C. GetName() D. ToString()

Computer Science & Information Technology