One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is to:

What will be an ideal response?


report the status of individual computer users

Computer Science & Information Technology

You might also like to view...

A(n) file type is a set of characters added to a file name to indicate the file's contents and origin.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are the fundamental differences between components as program elements and components as services?

What will be an ideal response?

Computer Science & Information Technology

A constant is a value in a formula that doesn't change. _______________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How does hashing work?

What will be an ideal response?

Computer Science & Information Technology