Banner grabbing and identifying open ports are performed during which of the following steps of hacking Linux?

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege


ANS: B

Computer Science & Information Technology

You might also like to view...

Define propagation delay.

What will be an ideal response?

Computer Science & Information Technology

The horizontal placement of text within a placeholder is referred to as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Whereas a relational database can store more than two dimensions, a multidimensional database is a two-dimensional table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is true of unified communications?

a. Theyeliminate the need for multiple communications systems and vendors. b. Theymake it difficult to outsource the organization’s communications system to a third-party service provider. c. They record all financial transactions in the general ledger accounts and generate financial statements for external reporting. d. They plan and schedule production and record actual production activities in an organization.

Computer Science & Information Technology