Which of the following tools can be used to manually scan a system for vulnerabilities?

A) Ping
B) Telnet
C) Share Enum
D) Oph Crack


B) Telnet

Computer Science & Information Technology

You might also like to view...

Select from the list below the choice that is NOT a relational operator.

A. || B. == C. > D. !=

Computer Science & Information Technology

____ files are uncompressed, incorporate XML, and enable designers and developers to collaborate on Flash projects.

A. AIR B. iOS C. XFL D. DHTML

Computer Science & Information Technology

Pointer related problems associated with a class default assignment operator also exist with the ____.

A. assignment operator B. copy constructor C. default copy constructor D. default constructor

Computer Science & Information Technology

Using ________ allows the user to stretch or shrink the width, height, or both of printed output

A) Scale to Fit B) data bar C) the paste area D) Freeze Panes

Computer Science & Information Technology